12 K
aspersky Internet Security 6.0
•
Internal
, including the actions of company staff and users of
home PCs. Actions taken by this group could be deliberate or
accidental.
•
The technological factor
. This threat group is connected with technical
problems – use of obsolete or poor-quality software and hardware to
process information. This can lead to equipment failure and often to data
loss.
•
The natural-disaster factor
. This threat group includes the whole range
of events caused by nature and independent of human activity.
All three threat sources must be accounted for when developing a data
security protection system. This User Guide focuses on the area that is
directly tied to Kaspersky Lab’s expertise – external threats involving
human activity.
1.2. How threats spread
As modern computer technology and communications tools develop, hackers
have more opportunities for spreading threats. Let’s take a closer look at them:
The Internet
The Internet is unique, since it is no one’s property and has no
geographical borders. In many ways, this has promoted the development
of web resources and the exchange of information. Today, anyone can
access data on the Internet or create their own webpage.
However, these very features of the worldwide web give hackers the
ability to commit crimes on the Internet, and makes the hackers difficult to
detect and punish.
Hackers place viruses and other malicious programs on Internet sites and
disguise them as useful freeware. Furthermore, scripts that run
automatically when you open a webpage can execute dangerous actions
on your computer, including modifying the system registry, stealing
personal data, and installing malicious software.
By using network technologies, hackers can attack remote PCs and
company servers. These attacks can cause parts of your system to
malfunction, or could provide hackers with complete access to your
system and thereby to the information stored on it. They can also use it
as part of a zombie network.
Lastly, since it became possible to use credit cards and e-money through
the Internet in online stores, auctions, and bank homepages, online
scams have become increasingly common.