Do you hate computer threats? Are you curious about the methods it invades into your laptop or desktop? In fact, every computer threat is equipped with diverse channels to lands on your computer. In this post, you can have a comprehensive awareness.
The Internet – The Internet is unique, since it is no one’s property and has no geographical borders. In many ways, this has promoted the development of web resources and the exchange of information. Today, anyone can access data on the Internet or create their own webpage. However, these very features of the worldwide web give hackers the ability to commit crimes on the Internet, and makes the hackers difficult to detect and punish.
Hackers place viruses and other malicious programs on Internet sites and disguise them as useful freeware. In addition, scripts which are run automatically when certain web pages are loaded, may perform hostile actions on your computer by modifying the system registry, retrieving your personal data without your consent, and installing malicious software. By using network technologies, hackers can attack remote PC’s and company servers. Such attacks may result in a resource being disabled or used as part of a zombie network, and in full access being gained to a resource and any information residing on it. Lastly, since it became possible to use credit cards and e-money through the Internet in online stores, auctions, and bank homepages, online scams have becoming increasingly common.
Intranet – Your Intranet is your internal network, specially designed for handling information within a company or a home network. An Intranet is a unified space for storing, exchanging, and accessing information for all the computers on the network. Therefore, if any one network host is infected, other hosts run a significant risk of infection. To avoid such situations, both the network perimeter and each individual computer must be protected.
Email – Since the overwhelming majority of computers have email client programs installed, and since malicious programs exploit the contents of electronic address books, conditions are usually right for spreading malicious programs. The user of an infected host unwittingly sends infected messages out to other recipients who in turn send out new infected messages, etc. For example, it is common for infected file documents to go undetected when distributed with business information via a company’s internal email system. When this occurs, more than a handful of people are infected. It might be hundreds or thousands of company workers, together with potentially tens of thousands of subscribers. Beyond the threat of malicious programs lies the problem of electronic junk email , or spam. Although not a direct threat to a computer, spam increases the load on email servers, eats up bandwidth, clogs up the user’s mailbox, and wastes working hours, thereby incurring financial harm.
Suspicious sites- Some website is provided by scammers or hackers to promote products or other unwanted programs. Once you enter into it, malicious add-ons/extensions and unwanted toolbar will insert into your computer.
Removable Storage Media – Removable media (floppies, CD/DVD-ROM’s, and USB flash drives) are widely used for soaring and transmitting information.