ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
  • »
  • Technology»
  • Internet & the Web

Internet Security Threats : Hacking

Updated on May 26, 2013

The Net

Click thumbnail to view full-size

Online System Threats

Some of the threats faced by online systems that use the internet on a regular basis are as follows:


  • Intrusion or Hacking
  • Viruses and Worms
  • Trojan Horse
  • Spoofing
  • Sniffing
  • Denial of Service

Details about hacking and intrusion into your computer systems is given as follows:

For information about Spoofing, click here: Spoofing


Hacking..

The purpose of gaining access to a person's computer without the knowledge of the user is know as hacking and the people who do this are known as hackers...

Once a hacker had managed to get access to your system, they can do practically anything they want to on your system, they can either alter the data available on your system o even steal private information like your Social Security Number, personal information and even sensitive information such as your bank account information, credit or debit card information and even your passwords...

Hackers tend to mostly target systems like eCommerce websites and financial websites that provide the facility for online banking.Then again it depends on each hacker and their choices..

Some people hack just outta curiosity and for the fun and heck of it.. in order to hack into a system a hacker has to crawl on to the targeted system and gather information about it's strengths and weakness, what kind of operating system is being used, unsecured folders in the system, configurations files, etc..

They gather all this data, analyse it to see how the website or system can be best comprised and once they've found their loophole into the system, they try and exploit the system.

A Trojan horse is a virus program created and used by many hackers to gain access and intrude in to a system.

Some of the loopholes that hackers find or look for are:

  • Poor Implementation of Shopping Carts
  • Hidden fields in the HTML forms
  • Client-side validation scripts
  • Direct SQL attack i.e the database
  • Session Hijacking
  • Buffer Overflow Forms, etc..

Preventive and remedial measures that can be taken:


Most eCommerce websites and even individual users have started using firewalls systems in order to prevent their systems from such cyber attacks..When a hacker tried to penetrate the firewall and attack your system, the firewall system immediately reports the attack and sometimes even helps in tracking the attack. But as time progresses hackers are now able to penetrate firewall systems so it's a good idea to conduct regular vulnerability tests and updation of your firewall system.

© 2013 Paiva

Comments

    0 of 8192 characters used
    Post Comment

    • WestelCS profile image

      Tim Anthony 3 years ago

      Very helpful information. Even the network devices are no longer free from worms and Trojan attacks. More and more threats and loopholes are found each day. Approximately 80%+ ATM in the world run on Windows XP. I can't guess what will happen from this April.