Threat is a common thing in life.
Everywhere
we go here, there will always be threat. It will occur if there are people
having bad intention towards another person. Bad intention frequently happened
when a person feels jealous or envy towards another person and feeling of
hatred. Threat can also become an activity where person being hired to hurt
others in different kind of ways and some of the people feels that being bad is
cool so they end up making it as their hobby. One normal example of threat is
when a student is having a quiz and the other friend that does not study will
try to copy his answers. So whenever there is a threat, we should try to
prevent it because it can harm us and bring corruption to the world.
There are many kinds and types of
threat in this world such as business threat where business is provoked,
friendship threat where a person will back-stab a friend because of jealousy, computer
threat which is virus, and threatening of own-self feelings such as pressure
and cannot control self-emotion.
In a computer system there are two
types of threat which are passive threat and active threat. Passive threat is threats
that occur unintentionally such as system down while active threats occur intentionally
by humans. Active threats made up of input manipulation, program alteration,
direct file alteration, data theft, sabotage and misappropriation or theft of
information resources. Two of the most famous active threats are that normally happened
in a computer system are sabotage threat and data theft threat.
Sabotage
Threat
Sabotage threat is a deliberate action taken with the purpose
of weakening an enemy, oppressor, oneself, or employer through means such as
obstruction, disruption, or destruction. Sabotage action is different from the
violence action because sabotage is a lesser evil action than the violence
action. More than that, sabotage can be in a good way and a bad way such as the
government will sabotage the intruders that try to hack the government files through
online. So sabotage can be used as a defensive tool if there is a threat to the
country. At the same time, sabotage can be an immoral action as it is used for
the wrong reason to gain self advantage such as send virus to other people’s
computer just to have fun or to steal confidential information.
Moreover, there are three types of
sabotage which are workplace sabotage, product sabotage and computer sabotage.
Workplace sabotage is bad action that is done in the environment of the office
or workplace and mostly it is being done by the management, employee and bosses
in the firms. Sabotage mostly happens when there are thousands of employees chasing
over one promotion such as general manager position that have been state by the
company. So the workers will compete between one another for the position and
there will come to a state of healthy competition and bad competition where one
of it is sabotaging.
Other
than that is product sabotage. Product sabotage is an action being practiced by
every product disturber to gain profit, procure many customers and kill the
competition of distributor that distributes the same product. Every distributor of goods will try the best that they can to achieve their goals even though
using neither good nor bad method. When a distributor is eager to own the
market, they will drastically do whatever they could until their competitor are
all gone and most of the method that they used is hiring a person to sabotage
other peoples’ company or production firms. This it to make sure that the firm
being sabotage cannot achieve their goals and the entire plan have been stolen.
The information stolen will be used by the firm that hired the spy.
Finally,
computer sabotage is a deliberate action that compromises the confidentiality,
integrity, or availability of a computer. Computer sabotage is an action that
is mostly used by a person that has a great knowledge of IT. One of the example
of computer sabotage are writing and releasing a virus, worm, sending out spam,
initiating a denial of service attack, installing a "back door",
altering or deleting data, damaging computer equipment, and causing data on
someone else's computer to become corrupted. Computer sabotage is an action
that is called as a ‘silent destruction’. It is because people cannot identify
where the attack comes from and who are the one that is attacking the system.
So this is the reason why every computer need anti-virus and spyware program so
that computer is not easily being sabotage.
Below are the videos related to sabotaging activities.
Data Theft Sabotage
Data theft is an illegal access which
are reading, editing, or coping of data without the data owner’s authorization.
In other words, if a company’s server has been accessed by a hacker it is a
case of data theft where they read the mails of our colleagues and steal
company’s information for own purpose or destruction purpose. Commonly, this
information is user’s information such as passwords, social security numbers,
credit card information, and other personal information or other confidential corporate
information. These kinds of information are significant and confidential to be
obtained because the reason of putting security into page is to protect
everything that is inside the page from other people. So when the individual
who stole this information is apprehended, he or she will be prosecuted to the
fullest extent of the law.
There are three types of data theft
which are hacking, remote access and spyware. Hacking is the practice of modifying
the features of a system in order to accomplish a goal outside of the creator's
original purpose such as hackers gets into a system where he or she is not
supposed to be and steals whatever data was aimed by the hackers. The person
who is consistently engaging in hacking activities and has accepted hacking as
a lifestyle and philosophy of their choice is called a hacker. One of the famous hacker is computer
hackers that commonly do hacking activities. Other than that, the way hackers
get into the system is by finding their ‘gate way’ through gaps in the security
system and by hoodwinking gullible employees or surfers in order to gain access
to a system. One of the other forms of hacking is phone hacking and brain
hacking.
Other than hacking, remote access is
also one of data theft which that has the ability of a person to gain access to
a computer or a network from a remote distance. Remote access allows the thief
to gain control of our machine from wherever he or she is and operate it such
as stealing data and can even distribute virus from it. One of the example of
remote access theft is when a person opens up the network to a connection from
an external source, a person will face a risk that the connection can be used
by a third party to access the network or that business information and can be
intercepted from network that is distance by them.
Moreover, Spyware is a form of malware or malicious software
programs that can be installed on a personal computer without the consumer's
awareness. It is picked up from websites, instant messages, email, and file-sharing
connections. It is sometimes called as 'piggybacks' a piece of software and
often advertised as security or acceleration software which is referred to as a
'Trojan horse'. Spyware always been brought in through adware. It may not sit
in the system but the key strokes or mouse clicks would be spied by them, in
other words we are revealing what we are doing and they are reading the data as
we put it in. Most of spyware theft happen is when an ad pops out to our screen
and when we click it we have opened the gateway for them to get into our system.
Below are the videos related to the data theft activities.
All in all, active threats has its own good and bad perspective. It is not encouraged to be used as self-interest but possibly encouraged to be used in the aid to the country or nation. It will then be at least something good and helpful. A good contribution can be made to your own generation.