Essays.club - Get Free Essays and Term Papers
Search

Electronic Robberies

Autor:   •  January 6, 2018  •  1,668 Words (7 Pages)  •  547 Views

Page 1 of 7

...

Software that allows collecting information about a user / organization in an unauthorized manner is designed to steal information. Their presence can be completely invisible to the user. They can collect data about user actions, the contents of the hard drive, installed software, quality and connection speed, etc. But it is not its only function. They are known for at least two programs allowing also control the computer. Another example of spyware are programs that install your Internet browser code to redirect traffic. Perhaps you've seen how they work, when instead of the requested web page opens another (Holt et.al, 2012, pp. 891).

The unsolicited messages from unknown sender sent massive amounts of advertising, political, propaganda, asking for help, etc. There are also dedicated to stealing passwords or credit card numbers, email chain letters, etc. Spam creates additional mail servers to load and can cause loss of desired information.

Passwords are the keys to your online accounts and services and, just as in real life, you should be careful who you give the keys. And legitimate sites do not ask you to send your passwords by email, so do not respond to requests for passwords to online sites. Because passwords are so important, you should think carefully before deciding to share with others, even family and friends (Marley & Mooney, 2015, pp. 49).

Hackers generally look for vulnerabilities on websites in simple usernames and passwords while "bots" sophisticated search the Internet connection information by default. Check your file permissions to restrict access to only administrators or limit the permissions to authorized users. Use the FTP client software or line of shell / SSH commands to the server access your website and changing the core files to be read-only (Ogunniye & Afolabi).

Hackers do not usually find many opportunities to attack the websites directly, so they developed different flanks attacks generate viruses that infect local networks or computers. Viruses looking at computers and networks vulnerabilities in the FTP connection, FTP infiltrate the user information and access to websites indirectly. Once the hacker has gained access to your files on the server via FTP, you can skip the access permissions to files and assume the identity of an administrator and delete or configure existing files or upload infected software or links to server your website. To prevent such attacks, update the software on your computer regularly, install and use a firewall and antivirus and routinely check your computer for malware. Avoid clicking on suspicious links or attachments in emails, since they can redirect your computer to infected sites that secretly download malware (Pelton & Singh, 2015).

Conclusion

No matter what your most ambitious objectives, keeping your computer free of problems is an essential first step on the path to better security. Therefore, before you begin worrying too - for example, about strong passwords, private communication and secure deletion - you need to ensure that your computer is not vulnerable to hackers (hackers) or is not plagued by malicious software (malware) such as viruses and spyware (spyware).

Otherwise, it is impossible to guarantee the effectiveness of any other security precautions you could take. After all, it makes no sense to close the door if the burglar is already in our kitchen, and it is not good to look in the kitchen if you leave the door wide open. Different solutions have been discussed above in this paper about avoiding online robberies. So, it is important to take necessary steps to avoid becoming a victim of electronic robbery.

---------------------------------------------------------------

References

Al Zaabi, K., & Tubaishat, A. (2015). Security Awarness Program for Customers Using Online Banking. GSTF Journal on Computing (JoC), 4(3).

Dupont, B. (2012). Skills and trust: a tour inside the hard drives of computer hackers. Available at SSRN 2154952.

Holt, T. J., Strumsky, D., Smirnova, O., & Kilger, M. (2012). Examining the social networks of malware writers and hackers. International Journal of Cyber Criminology, 6(1), 891-903.

Marley, R., & Mooney, J. L. (2015). Essential IT Controls for Preventing Cash Fraud. Journal of Corporate Accounting & Finance, 26(2), 49-57.

Ogunniye, G. B., & Afolabi, O. M. A Hybrid Authentication Mechanism for Preventing Phishing Attacks on E-banking Systems: The Nigeria Case Study.

Pelton, J. N., & Singh, I. B. (2015). Who Will Control the Future, Black Hat Hackers or the Hacked?. In Digital Defense (pp. 127-144). Springer International Publishing.

...

Download:   txt (10.3 Kb)   pdf (61.1 Kb)   docx (15.1 Kb)  
Continue for 6 more pages »
Only available on Essays.club