Saturday, February 2, 2013

Discuss Briefly Two (2) Types Of Active Threats Creatively And Innovatively


There are two types of Active Threats :-

1) Data Theft


Data theft define that a serious problem in business today. In many highly competitive industries, both quantitative and qualitative information about one's competitors is constantly being sought.
Data theft is a term used to describe when information is illegally copied or taken from a business or other individual. Commonly, this information is user information such as passwords, social security numbers, credit card information, other personal information, or other confidential corporate information. Because this information is illegally obtained, when the individual who stole this information is apprehended, he or she will be prosecuted to the fullest extent of the law.

Data Theft Prevention Customer Story (File) 


2) Sabotage 



Computer sabotage poses a very serious danger to any information system. The destruction of a computer or software can result in the bankruptcy of a firm. Disgruntled employees, especially fired ones, are common perpetrators of sabotage.
In some cases a defrauder may use sabotage to create confusion to cover up fraud. For example, an individual might after the accounting databases and later try to cover up by sabotaging computer disks or other media.
Sabotage has become a major issue for Web commerce. Despite annual expenditures for electronic security that exceed $6 billion, successful hacker attacks on Web sites have increased steadily. Even the largest and most sophisticated organizations have suffered, and almost every day the financial press continues to report cases of hackers completely taking over corporate Web sites.

How to sabotage a computer to prevent user logging on



Thank You :D

Monday, January 28, 2013

Briefly Explain Two (2) Types Of Intruders Creatively And Innovatively



Intruders define is anyone who accesses equipment, electronic data, or file without proper authorization. However, the intruders who attack information systems for fun and challenge are known as hackers. There are many type of intruders include unnoticed intruders, wiretappers, piggybackers, impersonating intruders and eavesdroppers.


There are two types of Intruders that famous is :-

1) Impersonating Intruders 


Impersonating intruders are individuals who pose as someone else in order to defraud the company. One type of intruder use an illegally obtained user ID and password to access the company's electronic resources. Many companies are very lax about security over user IDs and password. In some cases, an individual, thought "social engineering", can obtain a user ID and password simply by calling the company's technology center on the telephone. 

Another is the professional industrial spy, who, for example, typically enters though a rear door wearing a service or repair uniform. This individual knows from experience that many companies have a rear door that employees often use for cigarette breaks. This door frequently is blocked open so that the employees can easily reenter. It can be identified by the cigarette butts around it on the ground.


2) Eavesdroppers 


The phrase "Eavesdroppers" basically means that people who eavesdrop, or people who listen in on conversations, will only hear people saying bad things about them behind their back or without them knowing. Standard cathode-ray tubes used in common video display units emit electromagnetic interference on a frequency capable of being picked up by an ordinary television set. 

Anyone with this equipment can monitor sensitive information as it appears on the company's CRTs. Any information that passes though any public communication network is vulnerable to eavesdropping and piggybacking. For example, simply removing one wire from a Tandy ( Radio Shack) scanner will allow one to monitor analog cellular telephone communications. There are clubs of individuals who make a regular habit  of recording telephone conversations involving celebrities and public figures.

How To Install Cell Phone Spy Tracking Application



How To Hack Your Neighbors Internet



That All, Thank You :)