Professional Documents
Culture Documents
computer system without the owner's informed consent. The expression is a gener
al term used by computer professionals to mean a variety of forms of hostile, in
trusive, or annoying software or program code.[1]
Software is considered to be malware based on the perceived intent of the creato
r rather than any particular features. Malware includes computer viruses, worms,
trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits,
and other malicious and unwanted software or program. In law, malware is sometim
es known as a computer contaminant, for instance in the legal codes of several U
. S. states, including California and West Virginia.[2][3]
Preliminary results from Symantec published in 2008 suggested that "the release
rate of malicious code and other unwanted programs may be exceeding that of legi
timate software applications."[4] According to F-Secure, "As much malware [was]
produced in 2007 as in the previous 20 years altogether."[5] Malware's most comm
on pathway from criminals to users is through the Internet: primarily by e-mail
and the World Wide Web.[6]
A computer virus is a computer program that can copy itself[1] and infect a comp
uter. The term "virus" is also commonly but erroneously used to refer to other t
ypes of malware, including but not limited to adware and spyware programs that d
o not have the reproductive ability. A true virus can spread from one computer t
o another (in some form of executable code) when its host is taken to the target
computer; for instance because a user sent it over a network or the Internet, o
r carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
[2]
Viruses can increase their chances of spreading to other computers by infecting
files on a network file system or a file system that is accessed by another comp
uter.[3][4]
As stated above, the term "computer virus" is sometimes used as a catch-all phra
se to include all types of malware, even those that do not have the reproductive
ability. Malware includes computer viruses, computer worms, Trojan horses, most
rootkits, spyware, dishonest adware and other malicious and unwanted software,
including true viruses. Viruses are sometimes confused with worms and Trojan hor
ses, which are technically different. A worm can exploit security vulnerabilitie
s to spread itself automatically to other computers through networks, while a Tr
ojan horse is a program that appears harmless but hides malicious functions. Wor
ms and Trojan horses, like viruses, may harm a computer system's data or perform
ance. Some viruses and other malware have symptoms noticeable to the computer us
er, but many are surreptitious or simply do nothing to call attention to themsel
ves. Some viruses do nothing beyond reproducing themselves.
What Is a Worm?
A worm is similar to a virus by design and is considered to be a sub-class of a
virus. Worms spread from computer to computer, but unlike a virus, it has the ca
pability to travel without any human action. A worm takes advantage of file or i
nformation transport features on your system, which is what allows it to travel
unaided.
The biggest danger with a worm is its capability to replicate itself on your sys
tem, so rather than your computer sending out a single worm, it could send out h
undreds or thousands of copies of itself, creating a huge devastating effect. On
e example would be for a worm to send a copy of itself to everyone listed in you
r e-mail address book. Then, the worm replicates and sends itself out to everyon
e listed in each of the receiver's address book, and the manifest continues on d
own the line.
What Is a Virus?
A computer virus attaches itself to a program or file enabling it to spread from
one computer to another, leaving infections as it travels. Like a human virus,
a computer virus can range in severity: some may cause only mildly annoying effe
cts while others can damage your hardware, software or files.
Sponsored
Java technology zone technical podcast series:: This new podcast series provide
s a new way to get information from the sources you trust most.
Almost all viruses are attached to an executable file, which means the virus may
exist on your computer but it actually cannot infect your computer unless you r
un or open the malicious program. It is important to note that a virus cannot be
spread without a human action, (such as running an infected program) to keep it
going.
People continue the spread of a computer virus, mostly unknowingly, by sharing i
nfecting files or sending e-mails with viruses as attachments in the e-mail.
What is spam?
Spam is flooding the Internet with many copies of the same message, in an attemp
t to force the message on people who would not otherwise choose to receive it. M
ost spam is commercial advertising, often for dubious products, get-rich-quick s
chemes, or quasi-legal services. Spam costs the sender very little to send -- mo
st of the costs are paid for by the recipient or the carriers rather than by the
sender.
There are two main types of spam, and they have different effects on Internet us
ers. Cancellable Usenet spam is a single message sent to 20 or more Usenet newsg
roups. (Through long experience, Usenet users have found that any message posted
to so many newsgroups is often not relevant to most or all of them.) Usenet spa
m is aimed at "lurkers", people who read newsgroups but rarely or never post and
give their address away. Usenet spam robs users of the utility of the newsgroup
s by overwhelming them with a barrage of advertising or other irrelevant posts.
Furthermore, Usenet spam subverts the ability of system administrators and owner
s to manage the topics they accept on their systems.
1. A person who enjoys exploring the details of programmable systems and how to
stretch their capabilities, as opposed to most users, who prefer to learn only t
he minimum necessary. RFC1392, the Internet Users' Glossary, usefully amplifies
this as: A person who delights in having an intimate understanding of the intern
al workings of a system, computers and computer networks in particular.
2. One who programs enthusiastically (even obsessively) or who enjoys programmin
g rather than just theorizing about programming.
3. A person capable of appreciating hack value.
4. A person who is good at programming quickly.
5. An expert at a particular program, or one who frequently does work using it o
r on it; as in a Unix hacker . (Definitions 1 through 5 are correlated, and people
who fit them congregate.)
6. An expert or enthusiast of any kind. One might be an astronomy hacker, for ex
ample.
7. One who enjoys the intellectual challenge of creatively overcoming or circumv
enting limitations.
One who breaks security on a system. Coined ca. 1985 by hackers in defense again
st journalistic misuse of hacker (q.v., sense 8). An earlier attempt to establis
h worm in this sense around 1981--82 on Usenet was largely a failure.
Use of both these neologisms reflects a strong revulsion against the theft and v
andalism perpetrated by cracking rings. The neologism cracker in this sense may ha
ve been influenced not so much by the term safe-cracker as by the non-jargon term c
racker , which in Middle English meant an obnoxious person (e.g., What cracker is t
his same that deafs our ears / With this abundance of superfluous breath? Shakesp
eare's King John, Act II, Scene I) and in modern colloquial American English sur
vives as a barely gentler synonym for white trash .
While it is expected that any real hacker will have done some playful cracking a
nd knows many of the basic techniques, anyone past larval stage is expected to h
ave outgrown the desire to do so except for immediate, benign, practical reasons
(for example, if it's necessary to get around some security in order to get som
e work done).
Thus, there is far less overlap between hackerdom and crackerdom than the mundan
e reader misled by sensationalistic journalism might expect. Crackers tend to ga
ther in small, tight-knit, very secretive groups that have little overlap with t
he huge, open poly-culture this lexicon describes; though crackers often like to
describe themselves as hackers, most true hackers consider them a separate and
lower form of life. An easy way for outsiders to spot the difference is that cra
ckers use grandiose screen names that conceal their identities. Hackers never do
this; they only rarely use noms de guerre at all, and when they do it is for di
splay rather than concealment.
Conclusion
This article outlined the key players and security attacks and defenses in an e-
Commerce system. Current technology allows for secure site design. It is up to t
he development team to be both proactive and reactive in handling security threa
ts, and up to the shopper to be vigilant when shopping online.
What is e-Commerce?
e-Commerce refers to the exchange of goods and services over the Internet. All m
ajor retail brands have an online presence, and many brands have no associated b
ricks and mortar presence. However, e-Commerce also applies to business to busin
ess transactions, for example, between manufacturers and suppliers or distributo
rs.
In the online retail space, there are a number of models that retailers can adop
t. Traditionally, the Web presence has been kept distinct from the bricks and mo
rtar presence, so transactions were limited to buying online and delivering the
goods or services. The online presence is also important for researching a produ
ct that a customer can purchase later in the store. Recently, there has been a t
rend towards multi-channel retail, allowing new models such as purchasing online
and picking up in store.