In: Economics
List and briefly discuss five threats to a computer network
1. COMPUTER NETWORKS: Computer viruses are pieces of software that are designed to be spread from one computer to another. They’re often sent as email attachments or downloaded from specific websites with the intent to infect your computer — and other computers on your contact list — by using systems on your network. Viruses are known to send spam, disable your security settings, corrupt and steal data from your computer including personal information such as passwords, even going as far as to delete everything on your hard drive.
2. PHISHING: Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. it can be very harmful and it considered as one of the most serious computer network threats. it creates more frauds and thus make a person financially insecure.
3. COMPUTER WORMS:
Computer worms are pieces of malware programs that replicate quickly. They are not very dangerous as peer say but they can spread from one computer to another. A worm spreads from an infected computer by sending itself to all of the computer’s contacts, then immediately to the contacts of the other computers. Thus it forms like a web of infected computers and spreads like a disease.
Interestingly, they are not always designed to cause harm; there are worms that are made just to spread via network. Transmission of worms is also often done by exploiting software vulnerabilities. these kind of harmful malware is easily spread and is experienced by many across the globe.
4. ADWARE: Any software that is designed to track data of your browsing habits and, based on that, show you advertisements and pop-ups. this is a very serious and profitable business idea. this is not illegal as it takes all your permissions and thus your data is manipulated for the other companies who want to sell their product via sites. Data breaching sis its one of the consequences. today data is every company's biggest asset and it is through frauds like these that they earn this data. Adware collects data with your consent — and is even a legitimate source of income for companies that allow users to try their software for free, but with advertisements showing while using the software.
5. TROJAN HORSE:
Trojan horse, or “Trojan,” is a malicious bit of attacking code or software that tricks users into running it willingly, by hiding behind a legitimate program. this is like hiding behind something catchy to harm.
They spread often by email; it may appear as an email from someone you know, and when you click on the email and its included attachment, you’ve immediately downloaded malware to your computer. Trojans also spread when you click on a false advertisement. this way it is very effective and their are less chances that you can identify someone doing it.
Once inside your computer, a Trojan horse can record your passwords by logging keystrokes, hijacking your webcam, and stealing any sensitive data you may have on your computer. this is very serious as it can harm you in a very effective manner without your knowledge.