Risks
If you think that there is absolute protection of the code against this type of threat, then you are mistaken. Yes, this is today a harsh and frightening reality. Talk about protecting only the site will not be true. A computer connected to the Internet is also part of one system. Therefore, if you are sure about the existence of risks. Related to the storage of information in the system, you can only significantly (depending on the means) reduce the chances of a successful attack for hackers.
Especially it is worthwhile to think about it to those who are engaged in e- commerce , it is to them "chained" look "pro". Imagine a hacker hacking your system and getting information about bank accounts, credit card numbers of all your customers, or stealing your keys to "purses" ... you will lose much more than saved for the maximum possible protection of your site's code.
Even, let's say you do not do anything like that and your site is absolutely unattractive to hackers, then consider another threat, in the face of banal Internet hooligans or as they are also called "vandals . " They, guided by unclear what interests, if not destroyed, they will spoil the site accurately.
How to protect yourself from various threats as much as possible, then separate pages on our site are devoted to this. On this page, let's sort them out by type.
Viruses have two characteristics. The first of them is the conduct of destructive activity to any information, wherever it is located in the system. That leads to the loss of necessary and valuable files. The second feature is that they multiply, by e-mail and any network connections - they have similar problems to other users. The propagation speed is slightly lower than that of the "worms".
Worms "crawl" from the computer to the computer, while using a security vulnerability. In addition, they create a copy for each IP address found by another computer. Hence their unusually high speed of propagation. In their code they do not carry the danger of destroying and corrupting other files. Their main task is to do as many "holes" as possible in the system to penetrate into it other, more dangerous malicious programs, for example - "Trojan horses" .
The software "Trojan horse" uses the same idea as that wooden construction from the work "Troy". Under the guise of a "useful" file (created by a hacker), it penetrates the system and, depending on the tasks assigned to it by the creator, it does its job. Most often, to date - this is the theft of passwords, keys and other confidential information. Although a "Trojan" is capable of any unauthorized action. A distinctive feature of the other programs listed above is the inability to self-propagate and self-propagating. The address of "horses" is indicated by their "master".
With all the other similar "mucks", the network can "dig up" and other malicious programs that carry a potential danger:
- Keyboard spies - are used to extract confidential information from the system, in particular passwords.
- Hacker's hackneys - under the guise of useful snapping, malicious code penetrates into the computer, allowing the hacker to control your computer (change settings, run programs, etc.).
- Dial-up programs - when connecting to the Internet, you connect not with your provider, but with anyone (for example, with a paid site of a pornographic nature), and after some time you get an invoice for paying for long-distance connection or services of a site.
This list can be continued for a long time, but tomorrow it will still not be complete. Who needs it - come up with something else. Among the most sophisticated ways is worth noting: interception of packets (by the principle of listening to telephone conversations) and attack by hackers using the "mirror" of the site. An example of the latter method may look something like this. The user buys something not on the site of any company, but on his "mirror" created by a hacker. At the same time, it is left without a thing and without money on a credit card.
Do not be particularly afraid of these risks, because there are and are constantly emerging new, quite effective means of combating them. Well, if you still seriously suffer from them and are in Russia, do not despair - the competent bodies in the person of division "K" really work, which are very competent on these issues.
Comments
Commenting on, remember that the content and tone of your message can hurt the feelings of real people, show respect and tolerance to your interlocutors even if you do not share their opinion, your behavior in the conditions of freedom of expression and anonymity provided by the Internet, changes Not only virtual, but also the real world. All comments are hidden from the index, spam is controlled.