First, I want to describe who the subjects of the issue are. In my opinion, the issue is the most relevant for the private and commercial information. Home users risk their security while connected to Internet. It is obvious that many people store private information such as Social Security and credit card numbers, as it is more convenient than to enter them every time completing a form for an online purchase. Hackers do not have to attack every user individually, they write special viruses named "Worms" and "Trojan horses" which, once run, could spread in a global scale. These programs may have different functions from gathering personal data to logging pressed keys and e-mailing the information to a hacker. Even if a user does not keep any valuable information, his or her computer does have a value for a hacker. "If you think that your small computer could not become an object of offence because it is very small, then you are mistaken. Even if it doesn't contain anything worthwhile, it could be perfectly used for breaking in other, more significant system." (A. Zaharchenko, Futurology without future [Computerra], 2002).
Not rarely, competing entrepreneurs with the help of unlawful means want to get information and use it for their advantages in the business. Usually valuable information is stored in companies' computers in non-encrypted form or could be easily accessed. Internet could be used by rivals or criminals just as a mean
References: Zaharchenko, A. (2002, December 24). Futurology without future. Retrieved March 14, 2005, from http://www.computerra.ru/print/softerra/technologizm/22926/ Honeycutt, J. (2004, April 20). How to protect your computer from Spyware and Adware. Retrieved March 14, 2006, from http://www.microsoft.com/windowsxp/using/security/expert/honeycutt_spyware.mspx IDS: Classification (2002, December 4). Retrieved March 12, 2005, from http://www.xakep.ru/post/17052/default.asp Stalsen, (2001, February 28). Researching Firewalls. Retrieved March 13, 2005, from http://www.xakep.ru/post/17052/default.asp Anonymity for lazy people (2004, June 17). Retrieved March 14, 2005, from http://www.xakep.ru/post/22763/default.asp