Individuals are using computers and internet at their homes and workstations and it has been observed that, there is a lot of advancement in the technology within the last decade. This technology has brought some potential risks and threats to our machines. Sometimes, these risks are not ignorable and, it has been found that, there are severe attacks on computers with different technique used by hackers and intruders. There should be proper security, in order to prevent the threats which, are attached with different viruses. These preventive measures may assist us to stop the unauthorized person to access to our computers. These unauthorised individuals may be intruders and hackers and, in order to get awareness of these hackers, there should be any detection, which enables us to know, that a hacker has accessed to our system. If a hacker accesses into our system then, we should know how to get rid of these hackers immediately because, they may cause potential losses to our system.
Discussion
When we are connected to the internet, it means that we are connected to a large network of computers and, when our computers are without protection then, it is opened for crackers and intruders. The time we spend on the internet may create certain risks all the time and, if we have an internet connection; such as cable or DSL then, we have larger potential security threats than any other internet connection.
Today, we use computers for our professional work and, other personal uses which may include email, chatting and other means of communications. No individual wants other person to check emails and use system to access others' systems. The question arises, that who would want to break into our computer at homes and, obviously they are hackers, attackers or crackers and normally, they are known as intruders. They do not care who we are as they want to access our computers, in order to attack other personal computers. In this way, hackers can hide their locations and attack the high profiles computer system, such as government or financial systems. Our computer may be at target all the time and, even if we are playing computer games and sending emails to our friends. Intruders are always trying to search new ways to access into the computers through “holes” into the computer software.
There may be honey token, that is bogus record in a network database and, there are other risks associated with data and application such as viruses, worm, Trojan horses and logic bombs. Privacy is the major concern in each organization, and if data is not secured then, companies loss their confidence in putting useful information into the clouds. The data may be altered, destructed, and lost.
Logic bomb may be due to the human error and cause unintentionally and, this may be due to the poor training and unauthorized downloading. Hacking may be due to the unauthorized access, denial of service and hijacking. Denial of service (DoS) may slow down the traffic at sites, and ...