Monday 28 January 2013

DISCUSS BRIEFLY TWO TYPES OF ACTIVE THREATS CREATIVELY AND INNOVATIVELY.


Threat is a common thing in life.


Everywhere we go here, there will always be threat. It will occur if there are people having bad intention towards another person. Bad intention frequently happened when a person feels jealous or envy towards another person and feeling of hatred. Threat can also become an activity where person being hired to hurt others in different kind of ways and some of the people feels that being bad is cool so they end up making it as their hobby. One normal example of threat is when a student is having a quiz and the other friend that does not study will try to copy his answers. So whenever there is a threat, we should try to prevent it because it can harm us and bring corruption to the world.


There are many kinds and types of threat in this world such as business threat where business is provoked, friendship threat where a person will back-stab a friend because of jealousy, computer threat which is virus, and threatening of own-self feelings such as pressure and cannot control self-emotion.


In a computer system there are two types of threat which are passive threat and active threat. Passive threat is threats that occur unintentionally such as system down while active threats occur intentionally by humans. Active threats made up of input manipulation, program alteration, direct file alteration, data theft, sabotage and misappropriation or theft of information resources. Two of the most famous active threats are that normally happened in a computer system are sabotage threat and data theft threat.


Sabotage Threat

Sabotage threat is a deliberate action taken with the purpose of weakening an enemy, oppressor, oneself, or employer through means such as obstruction, disruption, or destruction. Sabotage action is different from the violence action because sabotage is a lesser evil action than the violence action. More than that, sabotage can be in a good way and a bad way such as the government will sabotage the intruders that try to hack the government files through online. So sabotage can be used as a defensive tool if there is a threat to the country. At the same time, sabotage can be an immoral action as it is used for the wrong reason to gain self advantage such as send virus to other people’s computer just to have fun or to steal confidential information.

Moreover, there are three types of sabotage which are workplace sabotage, product sabotage and computer sabotage. Workplace sabotage is bad action that is done in the environment of the office or workplace and mostly it is being done by the management, employee and bosses in the firms. Sabotage mostly happens when there are thousands of employees chasing over one promotion such as general manager position that have been state by the company. So the workers will compete between one another for the position and there will come to a state of healthy competition and bad competition where one of it is sabotaging.


Other than that is product sabotage. Product sabotage is an action being practiced by every product disturber to gain profit, procure many customers and kill the competition of distributor that distributes the same product. Every distributor of goods will try the best that they can to achieve their goals even though using neither good nor bad method. When a distributor is eager to own the market, they will drastically do whatever they could until their competitor are all gone and most of the method that they used is hiring a person to sabotage other peoples’ company or production firms. This it to make sure that the firm being sabotage cannot achieve their goals and the entire plan have been stolen. The information stolen will be used by the firm that hired the spy.


Finally, computer sabotage is a deliberate action that compromises the confidentiality, integrity, or availability of a computer. Computer sabotage is an action that is mostly used by a person that has a great knowledge of IT. One of the example of computer sabotage are writing and releasing a virus, worm, sending out spam, initiating a denial of service attack, installing a "back door", altering or deleting data, damaging computer equipment, and causing data on someone else's computer to become corrupted. Computer sabotage is an action that is called as a ‘silent destruction’. It is because people cannot identify where the attack comes from and who are the one that is attacking the system. So this is the reason why every computer need anti-virus and spyware program so that computer is not easily being sabotage.


Below are the videos related to sabotaging activities.



Data Theft Sabotage

Data theft is an illegal access which are reading, editing, or coping of data without the data owner’s authorization. In other words, if a company’s server has been accessed by a hacker it is a case of data theft where they read the mails of our colleagues and steal company’s information for own purpose or destruction purpose. Commonly, this information is user’s information such as passwords, social security numbers, credit card information, and other personal information or other confidential corporate information. These kinds of information are significant and confidential to be obtained because the reason of putting security into page is to protect everything that is inside the page from other people. So when the individual who stole this information is apprehended, he or she will be prosecuted to the fullest extent of the law.


There are three types of data theft which are hacking, remote access and spyware. Hacking is the practice of modifying the features of a system in order to accomplish a goal outside of the creator's original purpose such as hackers gets into a system where he or she is not supposed to be and steals whatever data was aimed by the hackers. The person who is consistently engaging in hacking activities and has accepted hacking as a lifestyle and philosophy of their choice is called a hacker. One of the famous hacker is computer hackers that commonly do hacking activities. Other than that, the way hackers get into the system is by finding their ‘gate way’ through gaps in the security system and by hoodwinking gullible employees or surfers in order to gain access to a system. One of the other forms of hacking is phone hacking and brain hacking.


Other than hacking, remote access is also one of data theft which that has the ability of a person to gain access to a computer or a network from a remote distance. Remote access allows the thief to gain control of our machine from wherever he or she is and operate it such as stealing data and can even distribute virus from it. One of the example of remote access theft is when a person opens up the network to a connection from an external source, a person will face a risk that the connection can be used by a third party to access the network or that business information and can be intercepted from network that is distance by them. 


Moreover, Spyware is a form of malware or malicious software programs that can be installed on a personal computer without the consumer's awareness. It is picked up from websites, instant messages, email, and file-sharing connections. It is sometimes called as 'piggybacks' a piece of software and often advertised as security or acceleration software which is referred to as a 'Trojan horse'. Spyware always been brought in through adware. It may not sit in the system but the key strokes or mouse clicks would be spied by them, in other words we are revealing what we are doing and they are reading the data as we put it in. Most of spyware theft happen is when an ad pops out to our screen and when we click it we have opened the gateway for them to get into our system.



Below are the videos related to the data theft activities.





All in all, active threats has its own good and bad perspective. It is not encouraged to be used as self-interest but possibly encouraged to be used in the aid to the country or nation. It will then be at least something good and helpful. A good contribution can be made to your own generation.











No comments:

Post a Comment