Thursday, May 30, 2019

Internet Security Systems :: essays research papers fc

     According to a 2002 survey by the FBI, "the threat from computer crime and early(a) information security breaches continues unabated and...the financial toll is mounting." Some disturbing statistics include * 90 percent of those responding had at least one security problem. * 85 percent had detected viruses on their computers. * 80 percent said that they had lost money due to a security problem. * 75 percent reported patronise online attacks. Financial losses from Internet security problems continue to grow. At least 20% of organizations reported losses from online theft of private information in 2002. The modal(a) size of those losses was over $6.5 million, which was seven times as much as in 1997. Some of the increase is attributed to better reporting and more awareness of the problem, but much of the increase is due to increasing sophistication and persistence of online attackers (Kent & Piscitello 49).Threats to Internet security used to t ake the form of viruses, worms, and malicious enroll designed to make a system unstable, or delete certain files. These unwelcome intruders even lots announced their arrival with an announcement on the filmdom or some other visual disturbance that signaled a problem to the user. In contrast, security threats today are much more sophisticated, and are often undetectable. Rather than simply wanting to cause trouble and inconvenience for a user, these threats have the purpose of stealing confidential information from the target computer, including things like passwords, keys for denotation encrypted messages, or even recording keystrokes (Martin 18).Known commonly as spyware, these programs often are used to track the Web sites that a user visits, so as to gather marketing information. But there is less benign spyware that is able to change browser settings, scan files on a hard drive, or build programs without the user knowing. A user may unwittingly download a spyware program al ong with games, media players, peer-to-peer programs, or other utilities. In some cases, the user unwittingly agrees to the spyware installation by clicking yes to a user agreement without reading it through first. Spyware consumes memory and processing re rises, invades privacy, and can promote system instability. It is often difficult to train once installed on a computer. Ways to reduce the risk from spyware include updating security policies to allow only trusted software for download, and investigating the source of any program before downloading it, to make sure it is reputable.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.