Wednesday, June 24, 2009

The treat of online security: How safe is our data?

Posted by e-commerce at Wednesday, June 24, 2009
Electronic transactions and Web sites create business risks. Criminals around the world are stealing credit card information, bank account and other personal information in greater numbers than ever before. Thus, an E-commerce security consisting of multiple layers of defense is needed. There are two types of attacks - nontechnical and technical.

Non-technical attacks is an attack that uses chicanery to trick people into revealing sensitive information of performing actions that compromise the security of a network. Examples of non-technical attacks are pretexting and social engineering.

In contrast, software and systems knowledge are used to perpetrate technical attacks. A computer worm is an example of a technical attack. Hackers often use several software tools readily and freely available over the Internet and study hacker and security websites to learn vulnerabilities.

Malicious code: viruses, worms, and trojan horse
Malicious sometimes referred to as malware( for malicious software), it is classified by how it propagates( spread).

  • virus: a piece of software code that inserts itself into a host, including the operating systems; running its host program activates the virus. A virus have two types of components. First, it has a propagation mechanism by which it spreads. Second, it has a payload that refers to what the virus does once it is executed. Some of the viruses simply infect and spread but some of others do substantial damage such as deleting the files or corrupting the hard drive.
  • worm: a software program that runs independently, consuming the resources if its host in order to maintain itself, that is capable of propagating a complete working version of itself to another machine. Worms consist of a set of common base elements such as a warhead, a propagation engine, a payload, a target selection algorithm, and a scanning engine. The entire process takes seconds or less, which is why a worm can spread to thousands of machines.
  • trojan horse: a program that appears to have a function but that contains a hidden function that presents a security risks. There are many types of Trojan horse programs. Basically, Trojan horse has two parts which is a server and a client. The server is the program that runs on the computer under attack while the client program is the program used by the person perpetrating the attack.
Lastly, the risks exposed by computer users is increasing with more advanced technology. Therefore, safeguards developed must always be up to date so that it could enhance the defense against online security treats.

0 comments:

Post a Comment

 

E-ComMeRcE Copyright © 2009 Baby Shop is Designed by Ipietoon Sponsored by Emocutez