Information System Security

Information system security processes and  invitees provide valuable input into managing IT systems and their development, enabling g risk identification, planning and mitigation. A risk management approach involves continually balancing the protection of agency information and assets with the cost of security controls and mitigation strategies throughout the complete information system development life cycle (see Figure 2-1). The most effective...

Malware, trojans and threats

Most PCs are now connected to the Internet and networks, making easier the spread of malicious software (malware), which includes trojans (also known as trojan horses), viruses, worms, spyware, adware, rootkits and other malicious or unwanted programs. Like spyware and adware, trojans can get onto your computer in a number of ways, including from a web browser, via e-mail, or in a bundle with other software downloaded from the Internet. You may also inadvertently transfer malware via a USB flash drive or other portable media. It is possible that...

Malware types

Adware Malware Adware Malware is the class of programs that place advertisements on your screen. These may be in the form of pop-ups, pop-unders, advertisements embedded in programs, advertisements placed on top of ads in web sites, or any other way the authors can think of showing you an ad. The pop-ups generally will not be stopped by pop-up stoppers, and often are not dependent on your having Internet Explorer open. They may show up when you are playing a game, writing a document, listening to music, or anything else. Should you be surfing,...

Malware

Malware is short for “malicious software."  It includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. These programs can cause your device to crash and can be used to monitor and control your online activity. Criminals use malware to steal personal information, send spam, and commit fraud. Avoid Malware Scam artists try to trick people into clicking on links that will download malware and spyware to their computers, especially computers that don't use adequate security software. To...

Phishing

                                          Formate of Phishing Messages You open an email or text, and see a message like this: "click to login in orkut" "Choose your net banking and login from your mailbox" "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." "During our regular verification of accounts, we couldn't...

Latest computer security threat

Latest 10 virus alerts 1 Troj/Mdrop-DKE 2 Troj/Sasfis-O 3 Troj/Keygen-FU 4 Troj/Zbot-AOY 5 Troj/Zbot-AOW 6 W32/Womble-E 7 Troj/VB-FGD 8 Troj/FakeAV-DFF 9 Troj/SWFLdr-W 10 W32/RorpiaMem-A Top 10 viruses in October 20111 Troj/Invo-Zip2 W32/Netsky3 Mal/EncPk-EI4 Troj/Pushdo-Gen5 Troj/Agent-HFU6 Mal/Iframe-E7 Troj/Mdrop-BTV8 Troj/Mdrop-BUF9 Troj/Agent-HFZ10 Troj/Agent-HGTTop 10 virus hoaxes 1 Hotmail hoax 2 Budweiser frogs screensaver 3 Bonsai kitten 4 Olympic torch 5 MSN is closing down 6 A virtual card for you 7 Meninas da Playboy 8 Bill Gates fortune 9...