![]() |
| Cyber Threat |
As it is a valuable item , certainly accompanied also with a number of interested parties to " have it " . Jewelry
, for example , are often hunted man to be owned because its value is
gradually increasing ( read : a worthwhile investment ) . But
there are also those who want to have it in ways that evil , like to
steal , rob , and even took it out of legitimate ownership . Similarly same thing happen to the internet . Increasing the value of the virtual world , the more the accompanying threats . The
first threat in the form of a desire or a group of people and those who
want to take a wide range of property or valuable goods traded or
exchanged on the internet . Starting
from the things that directly represent financial resources , such as
digital cash , debit card value , wealth in bank accounts , the number
of credit card bills , and so forth - to intangible entity that has a
certain strategic value as intelligence data , bank account passwords , confidential information consumers , and others . The
second threat in the form of bad guys intent is to make the Internet
does not operate normally , or in other words, trying to make the mall a
function on the internet . The
hope is that an interruption in the process of trading , the activity
of access to information, administrative procedures , and so forth . As more and more aspects of life are dependent on the internet , then this disorder can result in prolonged chaos . The
third threat in the form of an effort to make modifications to the data
or information flowing on the Internet for purposes destructive , such
as defamatory , misleading , pitting , destroying the image , deceptive ,
and others . For
nations that are physically and ideologically at war , the ways
mentioned above is the activity of " war " everyday that can occur in
cyberspace . The
fourth threat in the form of the individual 's will to spread the wrong
things to the whole population in the world , such as : schools -
schools that are misleading , pornographic images and media ,
information supporting acts of terrorism , offer gambling activities ,
ways of doing evil in disguise , and so forth . Threats
fifth or final form of the distribution and planting malicious programs
( read : malicious software) to computers connected to the internet
with the intention that Berane - wide , ranging from non- destructive -
such as the display is not diiginkan , disrupt the function letters
on the board press ( read : keyboard ) , no operation of input-output
equipment , etc. - until that is very destructive , such as deleting the
contents on the hard disk , retrieve data without the owner's knowledge
, spy on user activity , tie up the computer or better known as " hang " , degrading the performance of the processor speed , and other things that are very detrimental . The following information shows how terrible threats that exist in the virtual world today . For example , there is a site that sells 29,000 individual email addresses at a price of five dollars ; while
there are other sites that only with the $ 300 can provide information
related to bank accounts of individuals who have the money on the 100
million dollars ; or a site that offers services site damage ( read : website ) with rates range from three to five dollars per site. Overall this threat is a threat or a natural thing because of the high value of the Internet as described previously . Therefore , anyone with internet users , let vigilant and be wary of the risks accompanying threats .In addition, no information technology designed perfectly so free from insecurity ( read : vulnerabilities ) . Reports
from various research institutions and Internet watchdog showed that
latency to application programs ( read : software ) are increasingly
growing quantity and quality. This
is in line with the growing number and complexity of the number of
incidents that occurred in the virtual world as a result of the
exploitation of these vulnerabilities by parties who are not responsible
. In
short, in line with the information technology applications beneficial
to mankind , also increased intrinsic risk contained in it ( read :
embedded risk) . Mitigate
against these risks - in the sense of reducing the high probability of
exploitation on the threat , or at least reduce the impact of losses
caused by the incident is not terindahkan - is a wise thing to do by
everyone .

0 comments:
Post a Comment