- Published: December 25, 2021
- Updated: December 25, 2021
- University / College: University of British Columbia
- Level: Undergraduate
- Language: English
- Downloads: 21
Internet Threats Internet threats comprise any threat using the internet to expedite cybercrime. There are several internet threats affecting internet users all over the world. Some of these threats include; hacking, malware, key-logging, viruses, hardware problem, just to mention but a few. Hacking is a criminal threat since it involves modifying features of a system with intentions of accomplishing goals that fall outside the original purpose of the creator. Additionally, it is normally done without the consent of the creator (Vacca 42). On the other hand, malware short form of ‘ malicious hardware’ refers to the unwanted software installed in one’s computer without his consent. They comprise Trojan horses, viruses, worms, adware, spyware, just to mention but a few. Key-logging is also considered as a malware since it involves using software to record keyboard keys pressed by an in order to monitor their actions of on the computer. All these are considered as criminal activities since they can be used to acquire information from people, as well as invade their privacy without their consent (Vacca 43).
Bad work ethics demonstrated by IT workers, librarians, and managers can lead to criminal activities. For instance, if a IT worker gives out access codes that safeguards an organization’s secrets, the secrets may reach the wrong hands. This may have detrimental effects to the organization. On the other hand, a librarian should not give a library’s access codes to a third party who is not registered or is not subscribed to the library. This is because he or she would be breaching the library’s policies as regard to its mode of operation. Lastly, managers, especially bank managers should be careful not reveal their bank’s secret codes. This is because the information may get to the wrong people who may use them to rob the bank.
In conclusion, it is essential to note that internet threats affect both individuals and leading organizations. Therefore, it is the responsibility of everyone to be wary of hackers, key-loggers, and malware software. This is because they can be used to acquire vital information that can be detrimental to an individual as well as an organization.
Works Cited
Vacca, John R. Practical Internet Security. Berlin, Heidelberg: Springer, 2006. Print.