
|
|
How threats
spread |
|
|
As modern computer technology and communications
tools develop, hackers have |
more opportunities for spreading threats. Let's
take a closer look at them: |
|
The Internet |
|
The Internet is unique, since it is no one's
property and has no geographical |
borders. In many ways, this has promoted
development of countless web resources |
and the exchange of information. Today, anyone can
access data on the Internet or |
create their own webpage. |
|
However, these very features of the worldwide web
give hackers the ability to |
commit crimes on the Internet, making them
difficult to detect and punish as they |
go. |
|
USB flash drives |
|
USB flash drives are widely used for storing and
transmitting information. |
|
When you use a USB disk that has malicious
programs on it, you can damage data |
stored on your computer and spread the virus to
your computer's other drives or |
other computers on the network. |
|
|
|