Two of the most common approaches utilized for hacking personal information are known as phishing and “man-in-the-middle attacks.” These approaches rely on the use of ‘spoofed’ e-mail messages and other techniques to direct consumers to fake web sites where their private information can be easily swindled. By fooling victims into divulging their usernames and passwords, attackers can gain access to the victims’ accounts.

Recently, however, there has been a migration from email based attacks to web-based attacks by cyber criminals. This results in a threat not just for consumers, but also it poses a direct threat to companies. The risks for companies include the possibility that important information will be lost, stolen, corrupted, or used fraudulently and that computer systems will be corrupted. Because much company information is recorded electronically and made available on networked computers, this information becomes more susceptible to theft and tampering than information that is on paper and stored securely in a safe or file cabinet. After all, for a person to steal from a locked file cabinet or safe requires him or her to physically enter an office or home. If a skilled hacker wishes to steal from a network computer, on the other hand, he or she does not even need to be in the same continent. All they need to do is create new electronic applications, execute their own programs, and conceal evidence of their crimes.

0 comments:

Post a Comment


About this blog

Followers

free counters