preview

Security in the Computer World

Good Essays

INTRODUCTION

The main purpose of security is to protect assets. Looking back into history, the big walls acted as a safeguard to a fortress or a kingdom. There were massive and strong doors which stopped any perpetuator from entering without permission. The same thing applies in the computer world, with the only difference being that it's virtual.

There are closed networks and open networks. The closed networks are available for a person who belongs to that entity. On the other hand, open networks are available for the rest of the people. Previously, networks were designed as closed for a set of people and sites which do not connect to other people. With the advent of personal computers, LANs, and the wide-open world of the Internet, …show more content…

This paper generally aims at understanding the need for business security in terms of some very uncommon threats present. These threats can cause a lot of damage to the industry and thus aims at destroying the majority of crucial data of the company. This paper will show the statistics and data of some of the major threats like Pharming, Browser hijacker, Bluesnarfing and Botnet. To conclude, the threat should be taken more seriously with respect to the loss.

THREATS
A threat is generally defined as an object, person, or other entity that represents a constant danger to an asset. Sans described threat as “anything that would contribute to the tampering, destruction or interruption of any service or item of value”. Threats possessed to an organization or business generally aim at identity theft, financial fraud, data breach causing loss to company’s asset. Fraud tricks can be applied on online user to gain knowledge about password username mother’s maiden name birthdate etc. These information are enough to fraud into ones bank account or create a new identity. In an open WiFi zone several computers can be hacked using hacking tools. The system can even be hacked using Bluetooth technology.

There are 4 general classes of threats which are possessed to an organization’s network system

Unstructured threats- these threats are generally possessed by untrained individuals who use easily available

Get Access