You are Equally Responsible for Your Security Breaches

Word Count: 471
Total View: 174

With the internet security risks rising up day by day, it becomes very clear that it is not only the fault of the cyber criminals but somewhere we are also responsible for that. How are we responsible?? Well the answer is obvious; it is our lack of awareness and concern.

Security Breaches

Security Breaches

As for the specimen, let us consider the most recent example of the largest Distributed Denial of Service (DDoS) attack on Spamhaus. A number of computers were exercised to project an attack that nearly broke down the Internet. This is one of the oldest cyber attacks but once again, it is proven very dreadful. If we look back in the past, in the year 1990, dreadful networks of ‘zombie’ machines were used in the similar way to damage the websites until they go offline, unusable, terminating e-commerce. In some cases, Denial-of-Service can be a mere act of joy, while in others it might be an intentional work of an intruder.

Also in the year 2007, in the city of Estonia the Internet was shut down because of denial-of-service attacks, which were populated and affected by botnet communication, and in 2008 Georgia was severely affected by botnets.

How DDoS causes chaos in the Internet?

Generally, DDoS or DoS attacks are administer by botnets, a bunch of internet-connected programs that smartly infects the systems as well as provides the access of corrupted computers. A small malicious software or malware or spam email becomes the source of this attack. Within this technique, a hacker gains access to several systems at a time, turning them into zombie computers, which in turn act as an element of powerful botnet to transfuse viruses, spam generation to create havoc.

Main targets of bots include unsecured computers or those, which are vulnerable for such attacks. As soon as a vulnerable computer is found, botnet infects it and report back to their superior named command-and-control server. Until and unless a particular task is assigned to them, botnets remain backstage.

You can relate the above technique in real life with the sleeper agents (spy) who creeps in the security of the organization until a pull together attack is prepared.

Previously there was not enough exposure to the Internet so it had limited number of users who definitely were unaware regarding the security breaches or threats prevailing around.

We all are aware of the fact that an individual is targeted at airport for carrying illegal assets. Similarly, applications/software’s, emails, etc. are targeted and enforced to carry malicious contents. Avoiding such circumstances will not help prevent such attacks. One should be aware regarding these types of threats and should take appropriate actions to secure and to update those security practices time to time, as this gesture only will ensure the protection against the prevailing security threats.

6 Comments

  1. Lauren June 8, 2013
  2. Peggy Pesiri June 7, 2013
  3. Vaibhav June 1, 2013
  4. Peggy Pesiri May 28, 2013
    • Louis Vuitton June 8, 2013
  5. Jasa May 28, 2013
Games Security
eCommerce
The Million-Dollar Question of eCommerce: How to Get Repeat Business?
Telephone System
Office Telephone System: How to Choose the Right One for Small Enterprise
Internet Marketing
Top-Most Internet Marketing Strategies on the Go
External Giveaway Freebie TechnoGiants Giveaway
MacXDVD
Freebie: MacXDVD Gives Away 10K Free Copies of MacX Video Converter
Flipbook
Giveaway #40: FlipHTML5 Flipbook 3-months Platinum Plan Subscription
iCare Data Recovery Pro
Giveaway #39: iCare Data Recovery Pro Free Download with License Key
Android iPhone
Travel App
5 Apps You Need to Pack for Your Next Vacation
Android Phone
5 Tricks to Speed Up Your Slow Android Phone
Money Online
Great Ways to Earn Money Online With Your Smart Phone
Adsense
On Page Optimization
Understand the effectiveness and important of On Page Optimization
Search Engine
Why Content Marketing is the New Key to Good SEO
Outsource SEO
5 tips that will help you with SEO Outsourcing
MAC Software
Hiring Software
How to Get the Most Out of Your Hiring Software?
DVD Copy
How do you copy DVD with DVDFab DVD Copy Software?
Able2Extract Professional 11
6 Time-Saving Tricks: Featuring Able2Extract Professional 11
Blogging Social Media
Time Management
8 Time Management Strategies for Fellow Bloggers
WordPress
7 Pros and Cons of WordPress for Blogging!
eCommerce
How to Set Up an eCommerce Store Using WordPress in 7 Steps
Email Marketing
Infographic: The Giant Email Marketing Statistics Guide
Ecommerce
Infographic: How to Create Your Ecommerce Store With Magento
Ways to Backup iPhone
Infographic: Ways to Backup iPhone – Avoid iPhone Data Loss
Debit cards
The Rise in use of Credit/Debit cards in India after Demonetization