Page 24 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 24

Information  Security and Privacy




                    Notes          The users  should detest themselves from  downloading freeware.  It  is often observed that
                                   organizations block free download software to prevent themselves from the attack of Trojan
                                   horses.




                                     Notes  Sometimes, a computer infected with Trojan horse are required to be reformatted,
                                     therefore, it is suggested that preventive steps need to enforced effectively than curing the
                                     infected computer system.

                                   2.3.3 Spam


                                   Spam constitutes 70 to 84 percent of daily emails sent throughout the world that demands an
                                   ever increasing need for IT resources to filter out this irritating and potentially malicious menace.
                                   Spam email comprises of unsolicited emails promoting products and coordinated spam attacks
                                   to consume so much bandwidth on a network so as to cause it to crash. Spam may use techniques
                                   “news service”  spam, which uses legitimate news headlines  to trick  recipients into  opening
                                   spam emails. Good email filters are used to filter the spams. And much of what slips through can
                                   be avoided by staying away not to trick with the emails. There should be check for signing of
                                   any online service or freebie.

                                       !

                                     Caution The naming system for creating email accounts should not be easily guessable
                                     because spammers are increasingly going through common name lists in order to harvest
                                     emails to spam.

                                   2.3.4 Phishing

                                   Emails with titles such as, “URGENT: Update Account Status” are all attempts by a spammer to
                                   “phish” the account details. The Phishing refers to spam emails to trick recipients into clicking
                                   on a link to an insecure website and provide details considering the website as genuine one.
                                   Typically, phishing attempts are carried out to steal account information for e-commerce sites
                                   such as banks, eBay or regular financial institutions’ websites. A phishing email tricks the user
                                   to click a link, which will take the user to a page where the user is asked to re-enter all his or her
                                   account details including credit card number(s) and/or passwords. These websites are not actual
                                   site, even though they look like it.





                                     Notes  To protect the network, users should be vigilant and detest themselves to opening
                                     and providing vital details requested by any financial institutions. They should confirm
                                     the integrity before supplying such details. Financial institution should also educate their
                                     employees about the most common ways in  which hackers try to  phish the  account
                                     information.

                                   2.3.5 Password  Attacks

                                   A ‘Password Attack’ includes a number of techniques used by hackers to steal passwords. Some
                                   of them are listed as follows:





          18                                LOVELY PROFESSIONAL UNIVERSITY
   19   20   21   22   23   24   25   26   27   28   29