HomeSecurity Page 5 - What’s behind the curtain? Part II
Conclusion - Security
In this second of a three-part series covering threats to computer security, we focus on attacks that are more specifically directed against a particular person or company.
As we can see from the discussion in this article, we may face a range of threats that are either set using specialized tools (denial of service, password cracking, packet sniffing) or are implemented by the human factor (social engineering). The widespread usage of hacking tools and the ease with which they can be used to damage are the main factors that cause more and more attacks to be listed everyday. Of course, human innocence (or lack of knowledge) adds to the problem and makes it even bigger.
We should not take for granted the need for security. Even the most secure system can be damaged by a well organized threat. Therefore we must be alert at all times, waiting for the unexpected.
We will continue the discussion of the possible threats you may encounter when using the Internet in the next article.