Preview

Report in Love

Good Essays
Open Document
Open Document
552 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Report in Love
We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the small to medium business (SMB) must address similar concerns. Can a hacker gain access to its servers? How can a business protect its data?
A personal computer virus is a hidden software program that spreads from personal computer to computer. Infection comes from reading an e-mail that has a virus program as an attachment, or from visiting a web site that has been compromised. By visiting such a web site, the virus can be unknowingly downloaded onto the personal computer.
Another scenario is when criminal hacker viruses attack the servers that house business systems, including e-mail servers, while others attach to the computer networking infrastructure.
One of the most common types of viruses uses a business’s system to send out spam (the business’s system becomes the surrogate sender of e-mails, which typically include advertising e-mails pertaining to medications, sex, and the like). Another common type of virus is oriented toward gaining confidential data.
Virus protection is a legal responsibility. A business that allows viruses to emanate from its site or from the laptops supplied to its employees may be sued for consequential damage. Insurance companies offer some protection to an organization that implements a full security program.

Install the appropriate antivirus software. The software works by recognizing the code in the virus’s program that is to be executed, and stops it dead. This well-known antivirus software products for the desktop and the enterprise is SENTINEL ANTIVIRUS. Both offer excellent products and services that address a business’s network, the server, and the desktop. Usually the purpose of a virus attack to a business system is to obtain confidential data, such as customer and credit card information. What must an SMB do to protect itself and its clients? Here are a few

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Block all ports that are not in use by our network and monitor all inbound and outbound traffic, keeping a close eye on the inbound to detect threats before they become a threat. Place firewalls and anti-malware software at this point and route all workstation traffic through main servers to better protect the network as a whole.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    * Ensure corporate/education and TAFE personal computers/laptops in use are regularly made available for antivirus software updates.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    Companies should download or purchase an anti virus software on their computers so that it will prevent hackers or third parties gaining access to their data.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Generally, the majority of the viruses are bundled up with outsider software to make the downloading and installation of pernicious program less demanding. It is likewise appropriated through phishing sites, undesirable taps on suspicious links and ads and pop-ups, opening spam emails messages or its related attachments, visiting dubious sites and porn sites. You can likewise infect your Windows System when you share your documents over peer to peer network. Hackers utilize some strategy to earn profit on the web. Installing plug-in, toolbar, add-on and expansions without thinking about it additionally lead to installation of TrafLab…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Spam is expected to increase to 80 to 90 percent of total email. New viruses turn desktop PCs into spam-spewing "zombies." There is also a new type of spamming technique called "phishing," used to dupe recipients into providing confidential personal identity information. You can expect the occurrence of these spam-virus hybrids to increase and develop into even more dangerous and damaging threats…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Since 1912 Lockheed-Martin was a concept derived from Glenn Martin with the design of his first airplane in collaboration with the founder of Alco Hydro-Aeroplane Company Malcolm Lockheed (Our History, 2017). The merger between Martin and Lockheed formed the well-known aerospace company Lockheed-Aircraft Company which is currently Lockheed-Martin. However, Lockheed-Martin evolved into a contractor for the U.S. defense in technology and security. Thus, making them extremely vulnerable to outside cyber-attacks and novice 'hackers.' Unfortunately, by 2011 a cyber-attack and Lockheed targeted the company reported no damage to the security.…

    • 750 Words
    • 3 Pages
    Good Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Mia Casa Network

    • 294 Words
    • 2 Pages

    Antivirus Software can be a number of choices. Upgrading already used antivirus would probably work as well as any other antivirus available.…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Virus is a kind of code created by human that can damage the whole system once it is been opened, and the trick that hackers use is that they send the virus in different way such as “junk email, pop-ups web pages or games. As soon as the user clicks on that particular email or pop-up the virus codes starts doing their job which is to damage the system by destroying files and other objects.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A major university opened a new computer lab for their Business School students. Due to the large number of students enrolled in the business school the computer lab had an overwhelming demand. The business school computer was unable to meet the overwhelming demand s the students needed to the computer lab. Therefore, Rod Stevenson, the director of the Student Computer Center decided to hold focus groups. The objective of the focus group was to determine overall student satisfaction with the lab, identify current problem areas and collect student recommendations for improvements.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Viruses: A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Viruses can damage and/or decrease the performance of the machine they “infect”.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Viruses: A computer virus is code that replicates by inserting itself into other programs. A program that a virus has inserted itself into is infected, and is referred to as the virus’ host. A virus needs an existing host program in order to cause harm.…

    • 10251 Words
    • 42 Pages
    Good Essays
  • Satisfactory Essays

    Files have a way of building up and can quickly use up your disk space. If you…

    • 392 Words
    • 2 Pages
    Satisfactory Essays