Quote

Accountancy students have a life. Studying is the first on the list and some are lucky to have anything else on it.

Saturday 2 February 2013

Discuss Briefly Two(2) Types Of Active Threats Creatively And Innovatively

hey and assalamualaikum everyone,

In this entry, I would like to explain on the active threats. The meaning of threats is a potential exploitation of vulnerability. There are two categories of threats which is active threat and passive threat. But for today, I would only cover two types of active threats only. Therefore,I have choose to give explanation on data theft and also sabotage.

1) DATA THEFT
Data theft is a growing problem primarily perpetrated by office worker with access to technology such as desktop computers and hand-held devices capable of storing digital information such as USB flash drives, iPods and even digital cameras. Since employees often spend a considerable amount of time developing contacts and confidential and copyrighted information for the company they work for, they often feel they have some right to the information and are inclined to copy and/or delete part of it when they leave the company, or misuse it while they are still in employment.

While most organizations have implemented firewalls and intrusion-detection systems very few take into account the threats from the average employee that copies proprietary data for personal gain or use by another company. A common scenario is where a sales person makes a copy of the contact database for use in their next job. Typically this is a clear violation of their terms of employment.












2) SABOTAGE
Sabotage is a deliberate action aimed at weakening another entity through subversion, obstruction, disruption, or destruction. In a workplace setting, sabotage is the conscious withdrawal of efficiency generally directed at causing some change in workplace conditions. One who engages in sabotage is a saboteur. As a rule, saboteurs try to conceal their identities because of the consequences of their actions. For example, whereas an environmental pressure group might be happy to be identified with an act of sabotage, it would not want the individual identities of the perpetrators known.






Here, I will attach some video related to data theft and sabotage. Do watch and enjoy. But take it as a lesson. Not for doing it for your own good. 

DATA THEFT

Data theft right before your eyes. 


Smartphone hackers: Data theft protection by Swiss banks




SABOTAGE

Windows XP hardware sabotage trick with notepad.






How to Sabotage a Computer (No Tools Needed)






*All pictures are credited to Google image while all videos are credited to Youtube*



Briefly explain TWO(2) types of intruders creatively and innovatively

hey and assalamualaikum everyone,

Today I am going to tell you a little bit on what intruders is all about. This is the theory part that we had learned a week after our mid semester examination that ends on the second week of January. And as usual, at the end of this entry, there would be a few video related to the types of intruders that I am going to explain later.

First of all, I would like to define what is intruder. Intruder is a person who attempts to gain unauthorized access to a system, to damage that system, or to disturb data on that system. In summary, this person attempts to violate security by interfering with system availability,data integrity, or data confidentiality. But we should remember that, hackers are one of the intruders that is used in popular media to describe someone who attempts to break into computer systems. typically, this kind of hacker would be a proficient programmer with sufficient tehcnical knowledge to understand the weak point in a security system.

Other than that, we also have many other types of intruders such as, unnoticed intruders,wiretappers, piggybackers, impersonating intruders, and eavesdroppers. But for this entry, I would explain in details only for two types of intruders that I have choose which is, WIRETAPPERS and PIGGYBACKERS.

1) WIRETAPPERS
A large portion of the information processed by the company's computers travels over wires and cables. some information is transmitted only from one room to the next, and other information may be transmitted across the country via the Internet. These lines are vulnerable to wiretapping , which may be done with even inexpensive devices, for example simple tape recorder and a short piece of wire, that are capable of performing the task without giving any clues that the wire is being tapped.

*This is how wiretapping works on the telephone*

*This would be the part of wiretapping equipment which includes electronic bugs,voice activated.




*And this would the details on the secret of wiretapping*

2) PIGGYBACKERS
The most sophisticated intruders of wire tapping is called piggybacking. With this method, the penetrator intercepts legitimate information and substitutes fraudulent information in its place. 

A customer of a business providing hotspot service such as hotel or cafe, is generally not considered to be piggybacking, though non customers or those outside the premises who are simply in reach may be. Many such locations provide wireless internet access as a free simply to draw people to the area. Others near the premises may be able to gain access. The process of sending data along with the acknowledgment is called piggybacking. 

*This shows the connection on piggybackers process*

So here is the video that I have said earlier. Do watch and enjoy!


*How to Hack wireless*

*How to know whether your cellphone is being tapped*




*All pictures are to be credited to Google image, Yahoo image, and the video is credited to Youtube.