Wednesday, 4 June 2014

Cyber Threat

By on 04:23
Cyber Threat
As it is a valuable item , certainly accompanied also with a number of interested parties to " have it " . Jewelry , for example , are often hunted man to be owned because its value is gradually increasing ( read : a worthwhile investment ) . But there are also those who want to have it in ways that evil , like to steal , rob , and even took it out of legitimate ownership . Similarly same thing happen to the internet . Increasing the value of the virtual world , the more the accompanying threats . The first threat in the form of a desire or a group of people and those who want to take a wide range of property or valuable goods traded or exchanged on the internet . Starting from the things that directly represent financial resources , such as digital cash , debit card value , wealth in bank accounts , the number of credit card bills , and so forth - to intangible entity that has a certain strategic value as intelligence data , bank account passwords , confidential information consumers , and others . The second threat in the form of bad guys intent is to make the Internet does not operate normally , or in other words, trying to make the mall a function on the internet . The hope is that an interruption in the process of trading , the activity of access to information, administrative procedures , and so forth . As more and more aspects of life are dependent on the internet , then this disorder can result in prolonged chaos . The third threat in the form of an effort to make modifications to the data or information flowing on the Internet for purposes destructive , such as defamatory , misleading , pitting , destroying the image , deceptive , and others . For nations that are physically and ideologically at war , the ways mentioned above is the activity of " war " everyday that can occur in cyberspace . The fourth threat in the form of the individual 's will to spread the wrong things to the whole population in the world , such as : schools - schools that are misleading , pornographic images and media , information supporting acts of terrorism , offer gambling activities , ways of doing evil in disguise , and so forth . Threats fifth or final form of the distribution and planting malicious programs ( read : malicious software) to computers connected to the internet with the intention that Berane - wide , ranging from non- destructive - such as the display is not diiginkan , disrupt the function letters on the board press ( read : keyboard ) , no operation of input-output equipment , etc. - until that is very destructive , such as deleting the contents on the hard disk , retrieve data without the owner's knowledge , spy on user activity , tie up the computer or better known as " hang " , degrading the performance of the processor speed , and other things that are very detrimental . The following information shows how terrible threats that exist in the virtual world today . For example , there is a site that sells 29,000 individual email addresses at a price of five dollars ; while there are other sites that only with the $ 300 can provide information related to bank accounts of individuals who have the money on the 100 million dollars ; or a site that offers services site damage ( read : website ) with rates range from three to five dollars per site. Overall this threat is a threat or a natural thing because of the high value of the Internet as described previously . Therefore , anyone with internet users , let vigilant and be wary of the risks accompanying threats .In addition, no information technology designed perfectly so free from insecurity ( read : vulnerabilities ) . Reports from various research institutions and Internet watchdog showed that latency to application programs ( read : software ) are increasingly growing quantity and quality. This is in line with the growing number and complexity of the number of incidents that occurred in the virtual world as a result of the exploitation of these vulnerabilities by parties who are not responsible . In short, in line with the information technology applications beneficial to mankind , also increased intrinsic risk contained in it ( read : embedded risk) . Mitigate against these risks - in the sense of reducing the high probability of exploitation on the threat , or at least reduce the impact of losses caused by the incident is not terindahkan - is a wise thing to do by everyone .

0 comments:

Post a Comment