Internet Security Threats

Powerful Essays
This paper is going to be on the different security threats on the internet, and the different ways to prevent and protect yourself from them. The different threats that are going to be covered are viruses, trojan horses, hackers, spam, corrupt IP packets, port scanner attacks, DOS(denial of service) attacks, spider attacks, worms and socail attacks. Also, I will cover different security practices and computer software and hardware that can help protect and prevent these different attacks on your computer, or network. Many people use the words virus, trojan, and worm interchangeably when talking about attacks on their computer, but in reality, they are different types of attacks, this paper will define and differentiate between the different types of attacks a computer can become a victim of. A virus is software thats used to infect and damage a computer. The code for the virus is usually imbedded into an existing program so that once the program that has the virus inbedded into is executed, the virus code activates and copies itself, it then attaches the copies of itself to other existing programs that exist on the system. Viruses may be simple pranks that just cause messeges to randomly pop up on the screen, but they can also be very damaging to a computer. Viruses tha damage computers destroy programs and/or data right away when they're activated, or on a certain date. There are some viruses that remain dormant and do its damage once a year. One example of this type of virus is the Michelangelo virus, a virus that usually only attacks MS-DOS systems, but can cause an equal amount of damage to other operating sytems, which only infects computers on Michelangelo's birthday. Computers usually get viruses through downloading and installing programs that already have the virus inbedded into it, or through e-mails that are infected. A trojan horse (also known as a trojan) appears to be a normal program, but when it's run, it performs illicit

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Estimated losses from malicious programs and viruses have been estimated in the billions of dollars. The costs come not only from theft of funds or information, but also the manpower and resources that it takes to find, track, and remove malicious programs, as well as replace programs or files damaged or removed. If you add in trust issues and loss of business from consumers because of data loss, the effects can be long lasting and even devastating to a business.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    2. Malware sent by email that can be a virus, Trojan horse, worms, logic bombs, or bots…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Viruses are small programs built with intent to harm or disrupt the useful computer programs. Some viruses aim at overloading the computer memory by an excessive use of computer resources. These viruses tend to fail a computer in executing the desired tasks. They lead to the dysfunction of a computer. The development or the spread of such malicious software in unethical.…

    • 965 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Internet Security

    • 474 Words
    • 2 Pages

    Internet Security as defined by the International Engineering Consortium is the process of preventing and detecting unauthorized use of your computer (Fogile & Peikari, 2004). Prevention measures help you to stop unauthorized users (also known as "hackers") from accessing any part of your computer system (Gralla, 2002). Unfortunately, hackers are always discovering new vulnerabilities to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of…

    • 474 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Keywords associated with this project: computer network, network security, malicious, vulnerabilities, attack, threats, quality of services, security policies.…

    • 659 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Threats come many shapes and forms such as Worms, Trojans and Viruses which generically get added to your system by clicking on an email attachment or downloaded from an untrusted site, which may contain malicious files.…

    • 1240 Words
    • 5 Pages
    Better Essays
  • Good Essays

    WAN Domain - Any public-facing server is susceptible to DoS and DDos attacks. A File Transfer Protocol (FTP) server that allows anonymous uploads can host Warez from black-hat hackers…

    • 5836 Words
    • 24 Pages
    Good Essays
  • Satisfactory Essays

    Access Control - 1

    • 450 Words
    • 2 Pages

    A virus is a computer program written for entering your computer without your permission. Some viruses just reproduce itself and spread through your system. However, some may cause damage or effect program or system performance. When this happens, it is referred to as your computer being infected. In today’s world of communication, with the internet, computers, cell phones, and having such easy access, viruses are a real threat to your computer system. Mark Ciampa, author of Security +, Guide to Network Security Fundamentals, wrote, “A biological virus is an agent hat reproduces itself”. (Page 43) He goes on to write, “A computer virus is a malicious computer code that, like its biological counterpart, reproduces itself on the same computer”. (Page 44) There are many different kinds of known computer viruses, and there are new ones being created every day. That is why computer and network security is so important. Some use these programs for scams or internet crime. This ranges from just breaking into computer system for fun, to stealing money, identity theft, company secrets, to child pornography. There is even a virus that is an email Trojan horse that could blow up your computer. Therefore, we need to be careful what emails we open and what we download to our computers. We need to be careful how we choose our also. There are people ready to get into your computer for any information they can retrieve. These bad people are called hackers, which Mark Ciampa describes in his Security + book on page20 of the first chapter. For example, South Carolina had a security breach that put 3.6 million taxpayers at risk for identity theft. The email entitled “CCIT advice on state security information breach” informed Clemson students on October 27th that personal…

    • 450 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Recent Security Threats

    • 1681 Words
    • 7 Pages

    Security threats are vastly becoming an ongoing threat to the information technology world today. Constant threats involve viruses, hacking, worms, and malicious activity within the virtual world of an organization or individual computer systems. Within every organization there is threat of data loss. Whether the loss is unintentional or malicious. Many factors are attributed to data loss such as malware, computer theft, hacking, and network exposure, to name a few. This type of data loss not only affects organizations but individuals also. In addition, all types of data are vulnerable. Why? More and more employees rely on e-mail for business communications. Individuals and organizations use e-mail as a central filing system, which the bulk of their critical business information is stored. This dramatically increases the probability of leaking sensitive, (NPI) Non-Public Information, or confidential data (Ruggiero, 2011). When a recipient’s email address is misspelled or an incorrect key is pressed by an employee and a message containing confidential information in the wrong hands. This paper will review recent security threats to individuals and organizations that occur within and organization and individually.…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    A computer virus is a piece of software that negatively affects the performance of a computer system. They may damage files, deny access to files or resources or be used to monitor the user’s personal data. A computer virus may come in different forms and is usually referred to as ‘malicious software’ hence the name malware.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Virus

    • 1092 Words
    • 5 Pages

    *Through the course of using the Internet and your computer, you may have come in to contact with computer viruses. Many computer viruses are stopped before they can start, but there is still an ever growing concern as to what do computer viruses do and the list of common computer virus symptoms. A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.…

    • 1092 Words
    • 5 Pages
    Good Essays