|
Threats to Computer Security
|
As information technology has rapidly developed and penetrated every aspect of human existence, the number of attempts to breach information security has increased exponentially. Cyber offenders often attempt to steal personal and confidential information to use it for their personal gains. Using various tools, they gain access to personal data (bank account and credit card numbers, passwords etc.), and misuse it. They can make your system malfunction or even gain complete access to your computer to use it as a part of a zombie network, a network of infected computers to attack servers, send out spam, harvest confidential information, or even spread new viruses and Trojans.
In light of these threats, a comprehensive information security software is needed. Active Virus Shield is designed to take account of all possible sources of threats and use a complete array of defensive measures.
Also see:
Sources of threats
How threats spread
Types of threats
Signs of infection
What to do if you show signs of infection
Preventing infection