Skip to content
THECSICENCE
THECSICENCE

EVERYTHING ABOUT COMPUTER AND SCIENCE

  • Pages
    • About US
    • Contact US
    • Privacy Policy
    • DMCA
  • Human values
  • NCERT Solutions
  • HackerRank solutions
    • HackerRank Algorithms problems solutions
    • HackerRank C solutions
    • HackerRank C++ solutions
    • HackerRank Java problems solutions
    • HackerRank Python problems solutions
THECSICENCE

EVERYTHING ABOUT COMPUTER AND SCIENCE

Internet Security Threats

YASH PAL, March 24, 2021July 11, 2025

Internet Security Threats – Due to the widespread use of PCs and development in networks connecting PCs to the company’s mainframe computers, there has been an increase in the chances of feeding undesirable data deliberately by outsiders.

A person with a PC in a remote place can use a phone line and illegally collect information without leaving any clues. individual users can copy confidential data from a company’s computer or their details from a remote station connected via a communication network.

Security means preventing the network communication system from falling into the hands of unauthorized people. The sender of data may wish to be assured that only the intended party actually receives designated data.

The receiver must authenticate first that it is the one who is authorized to receive data, and thereafter, the sender exchanges data. Hence, we need to take such steps so as to protect data during transmissions and guarantee that these transmissions are made by authorized persons only.

What is Computer Security? – (Internet Security Threats)

The collection of tools designed to protect data and thwart hackers is known as computer security. The network security methods adopted must address the following issues:

  1. Information in a computer system should only be accessed by authorized persons.
  2. The sharable resources must be available only for use by authorized members.
  3. Unauthorized persons should not be able to insert spurious messages or records into a file being transmitted in a network.
  4. It should not be possible for an unauthorized party to perform wiretapping in order to capture data or illicitly copy files and/or programs.

Some commonly known network threats are:

  1. Identity Interception: The identity of one or more of the users involved in communication is observed for misuse.
  2. Pretending: The pretense by a user to be a different user to gain access to information or to acquire additional privileges.
  3. Replay: The recording and subsequent replay of communication at some later date.
  4. Data Interception: The observation of user data during communication by an unauthorized user.
  5. Manipulation: The replacement, insertion, deletion, or disordering of user data during communication by an unauthorized user.
  6. Rejection: The denial by a user of having participated in part or all of the communication.
  7. Denial of Service: The prevention or interruption of communication or the delay of time-critical operations.
  8. Misrouting: The misrouting of a communication path intended for one user to another.
  9. Traffic Analysis: The observation of information about communication between users (absence/presence, frequency, direction, sequence, etc).
Internet security threats
Internet security threats

Other related tutorials

  1. Types of Firewalls
  2. Internet security and authentication methods
  3. Information privacy and copyright issues
Digital communication engineering subjects Digital communicationengineering subjects

Post navigation

Previous post
Next post

Leave a Reply

You must be logged in to post a comment.

Similar websites

  • Programming
  • Data Structures
©2025 THECSICENCE | WordPress Theme by SuperbThemes