Saturday, September 7, 2019
Have to choose a good topic from the area of ICT or computing Essay
Have to choose a good topic from the area of ICT or computing - Essay Example or your browser automatically installs program without seeking your permission and ends up installing a spyware or you click on a pop up and that triggers a program to install a spyware onto your machine. Apart from hackers, spywares are mainly created by the advertisement companies in order to track the online behavior of users. Along with spywares, the advertisement companies can also infect your system with tracking cookies which can track every site that you have browsed and can fetch the vital personal information. Generally the spywares created by these companies are not as lethal as the ones created by the hackers, in case the companies do not use the information for anything else apart from marketing but these spywares also turn your machine into a data transmitter for these advertisement agencies, seriously affecting the performance of your home based system. Imagine the previous times full of inconvenience and hassles when we had to stand in what appeared to be never ending queues, to execute any transaction at the bank be it some money transfer or even a minor enquiry. We had to spend hours for booking the railway tickets and for paying our utility bills. Then we jumped onto the era of internet where most of the needs of the day are resolved using internet itself. Few individuals now can be seen doing the transactions standing at the bank. But, as the wise people say ââ¬Å"There are no free lunchesâ⬠, there is a cost associated with this convenience as well. The sole identity that a person has during any online transfer is his password. In case the password to your bank account has been hacked by a smart hacker, after tracking the data from your computer system, he can transfer millions from your account into his account in just a few seconds. To your nightmare, it does not end here. He can sell the vital information, related to your companyââ¬â¢s strategy and stored in your system, to the competitor and since the information has been leaked from
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.