Senin, 24 Agustus 2009

Understanding of threats to Internet security

Understanding security threats on the Internet that are introduced into the habitat of the Internet

When browsing the Internet in the home or office, the team is exposed to the nature of the Internet where many types of threats that could cause the equipment to function properly. Unlike a large-scale network infrastructure company that provides information security management, computers in the home could be vulnerable to threats.

Definitions of threats programmed

The computers are designed to execute instructions one after another. These instructions are usually doing something useful to calculate values, maintain databases and communicate with users and other systems. Sometimes, however, instructions that are running can be harmful or malicious in nature. When damage occurs by accident, we call the code of a software error involved. The errors are perhaps the most common cause of unexpected behavior of the program.

But if the source of the damage from an individual plant is intended that the abnormal behavior occurs, the instructions call for malicious code, or a threat scheduled. Some people use the term to describe malicious software malware.

There are many different types of threats the program. The experts ranked the threats by the way they behave, how they are activated and how they spread. In recent years, the regular appearance of these threats have been described almost uniformly by the media as computer viruses and (in the more technical, media) worms. However, viruses and worms are a small fraction of malicious code that has been developed. Saying that all programs of data loss caused by the virus is so inaccurate as to say that all human diseases are caused by viruses.

Experts working in this area have formal definitions of all these types of software. However, not all experts agree on common definitions. Therefore, let's consider the following definitions of malware:

Security tools and tools

Usually designed to be used by security professionals to protect their sites, can also be used by unauthorized persons to find weaknesses. Rootkits are a special case: these are attack tools that install packages backdoor into the system once they have penetrated the security of the root account.

Backdoors

Sometimes called a trap door, allowing unauthorized access to your system. Backdoors, also called trap doors, are pieces of code written into applications or operating systems to grant access to software developers without going through the normal access of authentication methods. Rear doors and trap doors have been around for many years. Often written by application programmers who need to debug or half of the tracking code that is being developed.

Most backdoors are built into applications that require authentication or lengthy procedures that require a long setup user to enter many different values to run the application. When the program debugging, the developer can get special privileges or avoiding all the steps of configuration and authentication. The programmer may also want to ensure that there is a method of activating the program if something goes wrong with the authentication procedure that is being built into the application. The back door is the code that does not recognize some sequence of entry, or is activated when called from a user ID. Then, to access special grants.

Back doors become threats when used by unscrupulous programmers to gain unauthorized access. They are also a problem when the initial application developer forgets to remove a back door after the system has been refined and another person who discovers the existence of the door.

Logic bombs

Hidden features in programs that go after certain conditions are met. Logic bombs are programmed threats that are latent in the software of common use for a long period of time until they are triggered, at which time, the performance of a function that is not the function of the program in which they are contained. Logic bombs are typically embedded in programs by software developers who have legitimate access to the network.

Trojan Horses

The programs that seem to play a role, but actually perform another function (like the horse that was given to the Greek city of Troy, near the end of the Trojan War, a horse appeared to be an idol, but was actually a troop transport). Similar to its name, today Trojan horses resemble a program that the user wants to perform, for example, to access, a game, spreadsheet or editor. While the program seems to be doing what you want, you are actually doing something else unrelated to its advertised purpose, and without knowledge of the user. For example, the user may think that the program is a game. While it is printing messages about the initialization of the database and ask questions like "What is the name of your player?" and "What level of difficulty, you want to play?", the program can be really delete files, reformat the disk, or the fate of the confidential documents to a site in Argentina. Everything the user sees, until it is too late, is the interface of a program that the user is trying to execute. Trojans are, unfortunately, sometimes used as jokes in some environments. Often planted as a cruel trick of the hackers on web sites and distributed among people and sharing software.

Virus

A true virus is a sequence of code that is inserted into other executable code so that when the regular program is executed, the virus also executes the code. The viral code causes a copy of itself to be inserted in one or more other programs. Viruses are not separate programs that can not run on their own, and some host that is run to activate.

Worms.

Worms are programs that spread from computer to computer over a network, without changing other programs on the target machine. Worms are programs that can run independently of the machine and travel to the machine through the network connections, the worms may have portions of them run on many different machines. They do not change other programs, but may have other code that does (eg, a virus of truth).
Read more >>
 
Copyright 2009 All Rights Reserved | Template Minima edit by sudarma | e-reunian