Powered By Blogger

Welcome To The Marvelous World

Welcome to the Marvelous blog. We the Marvelous are From University Tunku Abdul Rahman Year 3 Semester 1. Our Group consist of 3 members included myself Eric known as Marvelous number 1. Sathiyasilan as Marvelous number 2 and Hon Fei as Marvelous number 3. Our Blog explain about how are we going to deal with our weekly assignment title about E-Commerce. Please anjoy and hope our information may help you all to gain more knowledge about E-Commerce

Wednesday, June 11, 2008

Review on My E-Commerce blog (week 4)

After reviewing http://ecommerze.blogspot.com/search/label/Internet%20Security I realize that how dangerous computer viruses and the different types of viruses may have different type of threat to our computer. According to the sites, among 130mil population internet user in China there one million of them got infected by viruses.

We should be proud that our Malaysian government has spend an amount of RM43 million to set up an International Multinational Partnership against Cyber terrorism. This centre offers the world best brain and facilities to help fight cyber security threat by eliminating viruses that roaming in the internet in our country.

On the other hand, Spamming is also one of the internet threats where its function is flooding of electronic mail systems with “junk e-mail”. Also known as unsolicited bulk messages sent through the electronic messaging systems. There are various types of spam such as PDF Spam, Piggyback Spam, and Greeting Card Spam where each of them pays a different role of their own.
Downloading movies or even mp3 in the internet may cause a threat because you may invite unwanted hackers hack into your computers. For example, one of the military pentagons was hacked and taken of 1500 emails account offline. After the incident, the US military band using e-mail anymore. Not only PC, mobile phone also is a victim Malware or known as mobile malicious software that act like a virus attack in your mobile phone.

In conclusion, we should use the internet wisely in order to prevent virus attack. Install a reliable anti virus software.

Safeguarding your Personal and Financial Data (week4)

Since that E-Commerce has been a very popular and convenient way for users, Internet users nowadays are lack on confident by revealing their personal data online, this has been a barrier to them. No worries, I have successfully found out a website that may solve your problems. http://www.onlinebackupvault.com/. This program is the one source for secure reliable online offsite data backup storage. The web was designed to be user friendly by utilizing simple but extremely powerful backup software allowing easy backups and easy restores. This site is subdivided to two types of protection which are the business services and residential services.


The business services are one source for online, offsite, secure data backup. It provides an easy automated encrypted solution for backing up all your data servers and workstation. The packages include software clients for virtually al server operating systems and server applications. Besides that, it also offers unlimited retention dates that allowed business user to hold in storage as many revisions of files as you would like.



As for the residential service, it include a plans named “Smart Search” technology which automatically backups all your files including my documents desktop and also internet favorites. A new technology “Dailintomypc” that may remotely connect to your computer and assist you in selecting your files that you would like to backup as well as show you how to view your backup logs.

Phishing. Example and Prevention (week 4)

There are 2 types of phishing. One is the Phishing Attacks and the other one is the Spear-Phishing Attacks. A simple explanation about phishing is that there are a numbers of fake online website that tries to lure online users to leak out their personal data and password, especially the credit card number.

Many have been solicited by fake eBay and Citibank requests for additional personal information. Research has found that there are occasional an e-mail from eBay advising user to update their account. There is a click button of right-click and View Source on the e-mail send and whenever you click it will link you to the other destination rather than eBay sites. This is one of the techniques that use by the phisher to hope that they will lure users with the threat of their account being closed or worse, hoping that they will provide their personal information.

There are several ways to prevent phishing which is through education. Gain additional knowledge on how to suspect corporate e-mail, even if it comes from a reliable authority. For example a company can hire security experts to spear-phish their own organization by looking for weak links and educating employees. Companies also can stop sending out links within IT, HR, and accounting-related e-mail rather than refer employees to an intranet, password-protected home page. Companies should also use secure Web forms rather than e-mail to transact personal information such as social security numbers and the like.

http://www.cnet.com/

Threat of Online Security (week 4)



The online security is the practice of protecting and preserving private resources and information on the Internet. There are several famous online security threats such as Internet Attacks, Vulnerabilities, Malicious Code, Phishing, Spam and Security risk as well as future trends. Most online users will fall as a victim to identity the theft, for example lost or stolen of credit cards of wallets. Moreover, maybe there could be careless transaction when you are buying sometime online, you may not realize that when you pay your goods by credit cards, the transaction of your personal information may accidentally leak out to others. This may allowed them record your password and use your credit card number without any limitations.



In order to make sure our data is safe, Zone Labs has released ZoneAlarm Pro 6.5 and ZoneAlarm Internet Security Suite 6.5, the first security software apps I know of to offer real-world identity protection, monitoring, and recovery. By partnering with an identity management company, Intersections, Zone Labs is making the promise that it will educate you, provide you the services you need to stay safe online and off, and should someone steal your identity, the team will be there to help you recover with personal assistance. Had you purchased similar services from an identity management service directly, you could easily double the purchase price of ZoneAlarm Internet Security. But for ZoneAlarm Pro and Internet Security Suite customers, the monitoring is free.

http://www.zonealarm.com/