Monday, 28 January 2013

DISCUSS BRIEFLY TWO TYPES OF ACTIVE THREATS CREATIVELY AND INNOVATIVELY.


Threat is a common thing in life.


Everywhere we go here, there will always be threat. It will occur if there are people having bad intention towards another person. Bad intention frequently happened when a person feels jealous or envy towards another person and feeling of hatred. Threat can also become an activity where person being hired to hurt others in different kind of ways and some of the people feels that being bad is cool so they end up making it as their hobby. One normal example of threat is when a student is having a quiz and the other friend that does not study will try to copy his answers. So whenever there is a threat, we should try to prevent it because it can harm us and bring corruption to the world.


There are many kinds and types of threat in this world such as business threat where business is provoked, friendship threat where a person will back-stab a friend because of jealousy, computer threat which is virus, and threatening of own-self feelings such as pressure and cannot control self-emotion.


In a computer system there are two types of threat which are passive threat and active threat. Passive threat is threats that occur unintentionally such as system down while active threats occur intentionally by humans. Active threats made up of input manipulation, program alteration, direct file alteration, data theft, sabotage and misappropriation or theft of information resources. Two of the most famous active threats are that normally happened in a computer system are sabotage threat and data theft threat.


Sabotage Threat

Sabotage threat is a deliberate action taken with the purpose of weakening an enemy, oppressor, oneself, or employer through means such as obstruction, disruption, or destruction. Sabotage action is different from the violence action because sabotage is a lesser evil action than the violence action. More than that, sabotage can be in a good way and a bad way such as the government will sabotage the intruders that try to hack the government files through online. So sabotage can be used as a defensive tool if there is a threat to the country. At the same time, sabotage can be an immoral action as it is used for the wrong reason to gain self advantage such as send virus to other people’s computer just to have fun or to steal confidential information.

Moreover, there are three types of sabotage which are workplace sabotage, product sabotage and computer sabotage. Workplace sabotage is bad action that is done in the environment of the office or workplace and mostly it is being done by the management, employee and bosses in the firms. Sabotage mostly happens when there are thousands of employees chasing over one promotion such as general manager position that have been state by the company. So the workers will compete between one another for the position and there will come to a state of healthy competition and bad competition where one of it is sabotaging.


Other than that is product sabotage. Product sabotage is an action being practiced by every product disturber to gain profit, procure many customers and kill the competition of distributor that distributes the same product. Every distributor of goods will try the best that they can to achieve their goals even though using neither good nor bad method. When a distributor is eager to own the market, they will drastically do whatever they could until their competitor are all gone and most of the method that they used is hiring a person to sabotage other peoples’ company or production firms. This it to make sure that the firm being sabotage cannot achieve their goals and the entire plan have been stolen. The information stolen will be used by the firm that hired the spy.


Finally, computer sabotage is a deliberate action that compromises the confidentiality, integrity, or availability of a computer. Computer sabotage is an action that is mostly used by a person that has a great knowledge of IT. One of the example of computer sabotage are writing and releasing a virus, worm, sending out spam, initiating a denial of service attack, installing a "back door", altering or deleting data, damaging computer equipment, and causing data on someone else's computer to become corrupted. Computer sabotage is an action that is called as a ‘silent destruction’. It is because people cannot identify where the attack comes from and who are the one that is attacking the system. So this is the reason why every computer need anti-virus and spyware program so that computer is not easily being sabotage.


Below are the videos related to sabotaging activities.



Data Theft Sabotage

Data theft is an illegal access which are reading, editing, or coping of data without the data owner’s authorization. In other words, if a company’s server has been accessed by a hacker it is a case of data theft where they read the mails of our colleagues and steal company’s information for own purpose or destruction purpose. Commonly, this information is user’s information such as passwords, social security numbers, credit card information, and other personal information or other confidential corporate information. These kinds of information are significant and confidential to be obtained because the reason of putting security into page is to protect everything that is inside the page from other people. So when the individual who stole this information is apprehended, he or she will be prosecuted to the fullest extent of the law.


There are three types of data theft which are hacking, remote access and spyware. Hacking is the practice of modifying the features of a system in order to accomplish a goal outside of the creator's original purpose such as hackers gets into a system where he or she is not supposed to be and steals whatever data was aimed by the hackers. The person who is consistently engaging in hacking activities and has accepted hacking as a lifestyle and philosophy of their choice is called a hacker. One of the famous hacker is computer hackers that commonly do hacking activities. Other than that, the way hackers get into the system is by finding their ‘gate way’ through gaps in the security system and by hoodwinking gullible employees or surfers in order to gain access to a system. One of the other forms of hacking is phone hacking and brain hacking.


Other than hacking, remote access is also one of data theft which that has the ability of a person to gain access to a computer or a network from a remote distance. Remote access allows the thief to gain control of our machine from wherever he or she is and operate it such as stealing data and can even distribute virus from it. One of the example of remote access theft is when a person opens up the network to a connection from an external source, a person will face a risk that the connection can be used by a third party to access the network or that business information and can be intercepted from network that is distance by them. 


Moreover, Spyware is a form of malware or malicious software programs that can be installed on a personal computer without the consumer's awareness. It is picked up from websites, instant messages, email, and file-sharing connections. It is sometimes called as 'piggybacks' a piece of software and often advertised as security or acceleration software which is referred to as a 'Trojan horse'. Spyware always been brought in through adware. It may not sit in the system but the key strokes or mouse clicks would be spied by them, in other words we are revealing what we are doing and they are reading the data as we put it in. Most of spyware theft happen is when an ad pops out to our screen and when we click it we have opened the gateway for them to get into our system.



Below are the videos related to the data theft activities.





All in all, active threats has its own good and bad perspective. It is not encouraged to be used as self-interest but possibly encouraged to be used in the aid to the country or nation. It will then be at least something good and helpful. A good contribution can be made to your own generation.











Thursday, 24 January 2013

BRIEFLY EXPLAIN TWO TYPES OF INTRUDERS CREATIVELY AND INNOVATIVELY


An intruder is anyone who accesses equipment, electronic data, or files without proper authorization. In other words, an intruder is the one that is not welcomed and having the intention to do criminal things to bring down someone for a miserable life which is also known as a trespasser. By the word intruder carries a lot of meaning. When someone says intruder, the first thing that will come in mind is that a person who broke in into a person's house which is said in other word as burglary.




However, intruder is also known as a person who is trying to steal information from another person by using the latest technology in our world which is the computer or laptop and the basic need for these activity is the internet.




Intruders is derived by the desire mostly to be a billionaire by stealing some very important information of an entity or valuable asset of an entity. They are also willing to do criminal things such as killing somebody or blackmailing somebody so that the intruder's secret is not exposed to the public as it is to be avoid to be acknowledge by the police and other authorities that might get involved in.



There are many types of intruders such as hackers, unnoticed intruders, wire tappers, piggy backers, impersonating intruders and eavesdroppers.

HACKERS



UNNOTICED INTRUDERS



WIRETAPPERS



PIGGY BACKERS



IMPERSONATING INTRUDERS



EAVESDROPPERS



Two of the most types of intruders that is increasing and is famous of its occurrence are wiretappers and piggy backers.
  • Wiretappers.
Wiretapping is the practice of connecting a listening device to a telephone line to secretly monitor a conversation. These kind of intruders is dangerous. It intrude in the sense of wiretapping someone's phone line in order to gain the confidential information that no one should know about. It is the easiest way to intrude someone's conversation without having to threaten somebody. However, wiretapping is not all the bad things. Sometimes it is used to spy on someone such as the police. Police have their own expert in wiretapping the criminal's conversation. It is to prevent from the bad things to happen and what the criminal planned will not be a success and so will add up to the peacefulness of a country or place. Check out the videos below on knowing what wiretapping may lead to and its other consequences.


OBAMA WANTS TO CONTINUE WIRETAPPING AMERICANS



WILLIAM KOSTRIC WIRETAPS MANCHESTER POLICE



Apart from that, a person can also detect and prevent on the wiretapping activities. It is shown in the videos below.

HOW TO TELL IF YOUR PHONE IS TAPPED



STOP CELL PHONE TRACKING, SPYING, STALKING, HACKING AND EAVESDROPPING WITH THE DETRACKTOR



  • Piggy backers.
Piggybacking is the practice of establishing a wireless internet connection by using another subscriber's internet access service without the subscriber's knowledge or consent. It is an  offence and may be convicted for crime under specific basis. These activity has been going on all over the world due to the urbanization and rapid technology development. The person who is able to do piggybacking might be someone who is expert in electronic stuffs and have wide knowledge about hacking field. It can also be learned in the internet. However, it is in the same shoe as wiretapping. Sometimes people could not afford for the internet so that is why they have to do such thing. In our sense as humans, it is not wrong and we sympathized that person. Nevertheless, it is still considered as a crime as internet access can be gain and get from the cyber cafes. Below are some videos that may relate to piggybacking.


CHEAP INTERNET ACCESS PROVIDER


.
LOOKING FOR THE CHEAPEST INTERNET SERVICE? MIGHT WANNA THINK TWICE



HOW TO GET FREE WIFI ACCESS ON YOUR MOBILE



Apart from that, a person can also detect  and prevent on the piggybacking activities. It is shown in the videos below.

HOW TO SEE WHO IS USING YOUR NETWORK, WIRELESS INTERNET



HOW TO TELL IF SOMEONE IS STEALING YOUR WIFI AND HOW TO GET THEM OFF





In a nutshell, intruders is made out of so many types in the world. There is advantages and disadvantages towards doing the intruding activities. So it is advisable for everyone to THINK TWICE before doing so.


LET'S TAKE A BREAK. :)