Computers and internet have become essential parts of our lives in the present day context. Whether it is in our offices, schools or homes, internet has become indispensable. Internet and technology can make your life so easy and comfortable and at the same time if you do not take the right measures to protect yourself from malpractices, it can make your life miserable. So think for a moment, how protected are you from the viruses and malware that are out there in the internet? Have you taken the right precautions to protect yourself or your business from cyber crimes? There are thousands of hackers and cyber criminals out there who can be a threat to your privacy. Therefore before you log into the internet next time make sure that you have made arrangements to not be vulnerable to such malicious acts.
Malicious action is carried out deliberately, either with the intention of doing damage or of committing another crime. The most common types of malicious action include, hacking, introduction of a computer virus and fraud. Apart from these, cyber terrorism, cyber extortion and cyber warfare are other types of crimes that are carried out with the use of computers and the internet. There are firewalls, antivirus programs, contingency sites, passwords and biometric access security and fraud detection services that can be used to prevent and detect the breach of computer security systems and computer networks.
Hacking is the term used for gaining unauthorized access to data or a computer system. Although hacking is seen as a threat to data confidentiality it can also threaten the integrity of data. Hackers using the internet are not only interested in just looking at that data but may also want to leave a message to announce their presence. These messages may change the value of the data or “corrupt” the data. Phishing is a form of hacking where the hacker attempts to obtain personal information of the visitor to a phony website in the hope that the visitor will enter any details such as the bank account number, home address etc. to avoid phishing you can use a phishing filter to scan the websites you visit.
Fraud on the other hand can be two types. One is the false creation of documentation using the computer system and the other is the misuse of the organization’s computer resources such as using office computer resources to run a private business. Use of fraud detection services and firewalls, passwords and biometrics can prevent frauds within an organization. Fraud includes altering anything in an unauthorized way, destroying, suppressing, stealing or deleting any stored data.
Computer viruses are programs that can duplicate themselves. They can “infect” other programs by adding a copy of themselves to the end of the program. Some viruses are harmless but there are others that can destroy data held as storage or even physically damage the computer.