Wednesday 23 January 2013

potential threats of IT



M2 discuss the potential threats which the use of IT has introduced:


Cyber bullying:-

Cyber bullying is when someone is bullying by phone or websites such as Facebook, the website is used to harass, threaten, embarrass or target another person by bullies. Cyber bullies can easily get to the victim because it’s online and it’s easy to find. Effects of bullying are that some people get depressed and can kill themselves.

 

It can be a worrying problem for young people. There are a range of different methods that can be used, including social networking sites like Facebook, emails and chatrooms. Cyber bullies often encourage their friends to join in the bullying.



Add caption


Spam

Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products or get-rich-quick schemes. Spam costs the sender very little to send — most of the costs are paid for by the recipient or the carriers rather than by the sender. Spam can by annoying and can contain viruses which can infect your computer and steal your data information.





Phishing:-

Phishing is a technique used to gain private data, such as passwords to web sites or credit card numbers. Hackers use information on websites, emails or other communication which looks exactly the same as the original. They try to scare victims that their account is closed or it will be closed, also they don’t use your name. The effects of phishing is that you can ruin someones life because they lose all their money and have to try to get it back. Banks online clients can lose trust to internet banking.



Denial of Service Attacks

For example, Malware usually comes as pop-up ads. It can hijack your browser, redirect your search attempts and you get pop-ups that the computer may have a virus and you need to buy a Firewall. However, you cannot use your Virus checker because it’s blocked. It makes your computer slow and you can’t open most of the programs, because hackers want you to buy a new Virus checker, and if you buy it, it doesn’t work and you need to buy their Virus checker again, this way the hacker steals your money.

Another example; blocking your online business by lots of HTTP requests by many bots (other computers) meaning you cannot provide a reliable service to your customers because your band width server is full.