Preview

Computer System: Security Threats and Defenses

Good Essays
Open Document
Open Document
651 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer System: Security Threats and Defenses
Security threats and defenses
Amanda Knight
BSA / 310
July 8, 2013
Ivon Young

Security threats and defenses The thing about not having any kind of anti-virus protection can destroy a computer’s system. You need to have an anti-virus protection on the computer so that you know the information that is stored is safe and also know that the virus will not crash your system. There are different types of things that can harm your computer, such as malware, adware, spyware, Trojan, rootkits, backdoor, and etc. I would recommend having some kind of anti-virus on your computer so that nothing will happen, it’s not saying this will not happen but you will have a better chance on it not happening to your computer if you put some kind of anti-virus on your computer and run a scan on a regular basics.
Social engineering is one type that you should watch for as a threat. This is a malicious user that will manipulate an organization’s member’s information. The attacker will use the information to bypass the security and access the confidential data that is stored on the system. The way this can happen is through e-mail, via phone, or even through instant messaging. The way you will know this is happening is because it will come in the form of hoaxes, phishing, or spam. The phishing attacks will be in e-mail, voice calls, or even social networks. The spam will come in three main forms that are called traditional spam, spim, and spit. The spam examples are like if you receive an e-mail from an unknown user that offers you a special offer and wants you to click some link to get the offer, another example is you answer a phone call from an unknown number and hear a recording saying that you qualify for a pre-approved bank loan and need your information to get the loan. An example of spim spam is where a user replies to an instant message in which they’re offered a free trial membership to some kind of program. Traditional spam is where attackers use spam as a way for

You May Also Find These Documents Helpful

  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Well trained employees play a huge factor in protecting the network. Many viruses and malware can be prevented just by paying attention and having a trained eye. It is important that employees can recognize and respond to social engineering techniques. Social engineering is a method that attackers use to gain information to make their attack successful. In other words, it is a method of gaining confidential information. Social engineering has been around for a very long time and it is the most basic way to bypass an organizations security.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You will be able to recognize various motivations and vulnerabilities for exploiting a social network platform.…

    • 1245 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    307-Task B

    • 265 Words
    • 2 Pages

    Biv, If your files are stored on computer or other electronic device you should ensure it is password protected and that any removable devices are locked away securely. Usernames and Anti-virus programs also give you better protection. Anti-virus is only effective if you keep it up to…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this lab, you implemented a portion of your organization’s BCP. Based on the BIA, the…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    To start off with I chose to go with our banking or financial industry. The banking industry is constantly getting attacked by various methods on a daily basis. I chose this industry because I happen to know someone who works in the security sector at Wells Fargo Bank, he was a good person to get information on what he sees on a daily or weekly basis. This paper is the opinion of myself and with gathered information from various resources.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The aim of this report is to provide a practical study in order to determine, analyse and investigate market data through the use of the famous Fama-French three factor model (FF3). Moreover, this study will test the theory and will provide evidence of the anomalies discovered in relation to the variation in stock returns. Hence, in short the study will allow for the assessment of the effectiveness of the FF3 given the market data, and the discovery of the potential limitations.…

    • 4112 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    For common indications that a virus might be present, Administrators and users need to be on the alert for missing files or programs; unexplained changes to the system’s configuration; unexpected and unexplained displays, messages, or sounds; new files or programs that suddenly appear with no explanation; memory “leaks or unexplained use of disk space; and any other odd behavior of programs or the operating system. If a virus is suspected, a good antivirus program should be installed and run to scan the system for viruses and attempt to remove or quarantine any that are found. in case all these measures fail, all mission-critical or irreplaceable data should be backed up on a regular basis.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    * Is there a backup plan implemented for in case a virus does infect a computer or the network?…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With the security of a computer it can get very complicating. You have to make sure you are aware of what you are using and how it operates in your system. In today’s society there are a million anti-virus software programs. Many of them have free versions and some just have trail versions you can test drive before buying the full version. McAfee and Norton have trail versions you can sample before getting the full version. With Panda, AVG, and other anti-virus programs they have a free version and full upgraded version you can use.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Security

    • 368 Words
    • 2 Pages

    I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace, prevention always has been my goal. I have security protection in place against attacks such as viruses, spam, malware, spyware, and adware and I ensure that the protection is up-to-date as it is essential part of prevention is to remain current. Other security measures an average user may do is to maintain their system is to allow Microsoft Windows to perform automatic updates. These updates can provide additional security measures to the system info structure. Running regular maintenance such as a system defragmentation will keep the system up-to-date and in proper order. The average user should also password protect their personal information. If the wireless network James used had been password protected James would not have had the opportunity to enter the network without first inputting the password.. I would feel violated to know that someone was using my wireless network without my authorization I would be horrified to know that individual was plundering through my private things. Securing a personal computer and a wireless network with a password is extremely important otherwise the system is open and vulnerable toward an attack. Furthermore, James was placing himself at risk by entering an unknown unsecured network. When I review the network settings on my wireless network I am able to view data, websites and activity going through my network. I enjoy this feature because I am able to see what my children are doing when they are online. I teach my boys how to protect themselves while online. In the future I plan to remain aware of any potential treats and I will review any new…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Imagine yourself going into the bank to get money out of your account for your rent or other important bill, and the account is dry and you just got paid the day before..or going to pay a bill with your credit card and card after card is maxed out then you find out that someone has stolen all your information and used all of your resources to live and pay bills. If this happened to me my heart would be beating so fast in panic id probably pass out considering I have so many kids to provide for. Well it happens everyday to people everywhere all over the world. One of the major problems causing this is called hacking which is defined by the company who created the website the free dictonary dot com, Houghton mifflin company, as to gain access to a computer file or network illegally or without authorization. It is a big problem not just here but in other countries as well.One incident id like to mention is the playstation store being hacked into…

    • 521 Words
    • 3 Pages
    Good Essays