|
APPENDIX No 3
RISKS RELATED TO THE USE OF ELECTRONIC SERVICES
- The possibility of receiving spam, or unsolicited advertising (commercial) transmitted electronically.
- Malware, which is software that is able to, once you start it, to infect files in the way of themselves, usually without being noticed by the user.
Computer viruses can be more or less harmful to the operating system in which they are located, but even in the less serious cases are a waste of RAM,
CPU and hard disk space.
- The presence and operation of Internet worms, or malware capable of self-duplication. E-mail worm is a disruptive network attack that collects all
email addresses are located in your program (eg MS Outlook) and then sends hundreds of emails containing the worm as an attachment.
- Ability to activation spyware, spyware is a software that spies user activities on the Internet, it installs without user knowledge, consent and
control.
- The opportunity to be exposed to cracking or phishing (password fishing) - in the context of computer phishing technique is hacking (cracking), used
to gain access to personal and confidential information to steal your identity by sending fake emails reminders to appear genuine.
- Software piracy - a term used by pirates to describe software that has been stripped copy protection and are available on the Internet, where it can
be downloaded
- Sniffing - illegal interception, other than tolerance within the limits of the concept of cracking and phising, relies on the use of sniffer - a
computer program, whose goal is to capture and analyze any data flowing on the network
- The possibility for other persons using the computerized system and / or the telecommunications network of illicit devices which give unauthorized
access to protected services
- Cryptanalysis, it is to find weaknesses in the cryptographic system, and thus enable it to break or bypass
- The opportunity to be exposed to the action of another unwanted or “malicious“ software, performing unintended actions by the user, does not fall under the definition of the boundaries of the above, and the ones which are under the names: wabbit, trojan, backdoors, exploits, rootkits, keyloggers, dialers, hoax.
|
|
Tags: master cutlery, knives, swords, fantasy master, samurai swords, ryumon, masahiro, ten ryu, fantasy daggers, rambo, elk ridge, survivor, m-tech, m-tech extreme,
|