Preview

SEC 280 Week 4 Case Study

Satisfactory Essays
Open Document
Open Document
425 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SEC 280 Week 4 Case Study
Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. Home computing has security issues quite different from yet includes all of the ones we face at work. At work Network Administrators secure everything for us and limit what we can access. Many people are not aware of what should be done or how to do it at home to assure the same level of security. One of the most basic things we need to do at home is to setup a router and firewall. Many people are not aware of the security risks of not using a firewall at home. Firewalls act as shields from unwanted traffic and intrusion. There are many types of packets that a well setup firewall can defend us from without our even knowing. Securing the router with passwords was also something that for a number of years in the early days of home computing that not many people were aware of. As a consequence home networks were left wide open for anyone to connect to and explore. Once inside they will have access to any machine also on that network. Another risk is spoofed attacks. Many people fall victims to banner ads on the internet that trick unknowing users into clicking on them and installing what they think is an essential software update to legitimate software. Often times however it may actually be some type of virus, malware, or root kit. A root kit is the most dangerous of those possibilities. Once installed a root kit can do any manner of things to your system. They can turn off all antivirus software they may be installed, or simply prevent that software from updating itself. They can even go as far as to render your system totally useless. The best way to avoid this is by going directly to the software developer’s website to get

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Soc 341 Case Study

    • 158 Words
    • 1 Page

    CCIB Intake received SOC 341 from co-complainant for complaint control # 27-SC-20170104121605. The reporting party is Michelle Allie, RN Case Manager with Mercy Hospice 9912 Business Park Dr., Sacramento 95827 (916) 281-3900. The SOC 341 is regarding resident Shirley Pond. The reporting party (RP) stated the home health aide Ramona was preparing to leave when the caregiver Lidia stated "aren't you going to make the bed!" Ramona replied the resident stated she was tired and wanted to lie back down after her shower. Lidia then went into the resident's room where the resident was sitting on the side of her bed and in the presence of the RP and the home health aide, yelled "why did you tell the nurse not to make your bed?" She then told the resident…

    • 158 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. This is to notify you that your 12.7% Retention Incentive will be cancelled effective 1/21/2016. You have accepted a promotion to a Clinical Pharmacist position within the organization with an effective date of 1/22/2016.…

    • 130 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Sec 572 Week 4 Ilab

    • 944 Words
    • 4 Pages

    * Run a Flow Analysis to update the topology. Open the Visual CLI on the ISP router and ping all of the Servers and Host PCs including the Attack PC Use the IP addresses indicated on the network topology page. Select the commands you entered in the Virtual CLI using the mouse and click on the Copy button. Use <Ctrl>V to paste the commands and output results into your Lab Document.…

    • 944 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Explain the organizational approaches to information security List and describe the functional components of an information security program Determine how to plan and staff an organization’s information security program based on its size…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    So how do you secure your connection and block unwelcome visitors and stay away? It doesn’t require you to become IT professionals but simple things will secure your system.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Although major part of security issues are from inside, Internet does take external threats. When users connect the Internet, the web browsers might contain breaches that permit scripts to access the system and may cause damages potentially. In addition, when information is transmitting through the public network, the transmission might be captured by someone else. This is known as man-in-the middle attack. (Dean, 2009) Another potential common risk associated with Internet is called reconnaissance threats. Attackers could detect the reachable networks, devices and services through the Internet connection, or even draw an entire network map. Furthermore, DoS attack is another risk users could encounter when using Internet. Hackers attempts to over-whelm the system in order to make it shut down. (Oppenheimer, 2011)…

    • 572 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 1 Case Study

    • 1259 Words
    • 4 Pages

    1. Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined?…

    • 1259 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The virus could be installed on systems. Viruses typically result in loss of confidentially, integrity, or availability…

    • 5836 Words
    • 24 Pages
    Good Essays
  • Better Essays

    Firewall Security

    • 2313 Words
    • 10 Pages

    Nowadays, computers and the internet are becoming increasingly popular, as companies as well as the general public are using firewalls to secure their private data held in their computers.…

    • 2313 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Malware

    • 483 Words
    • 2 Pages

    For maximum security, create an "air gap" between sensitive data and the Internet. To protect confidentiality and integrity, do not connect computers that store sensitive information to the Internet or other public networks. Any computer connected to the Internet is exposed and possibly vulnerable to a huge number of attacks.…

    • 483 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Thus, doing some electronic business on the Internet is already an easy task. As is cheating and snooping. Several reasons contribute to this insecurity: The Internet does not offer much security per-se. Eavesdropping and acting under false identity is simple. Stealing data is undetectable in most cases. Popular PC operating systems offer little or no security against virus or other malicious software, which means that users cannot even trust the information displayed on their own screens. At the same time, user awareness for security risks is threateningly low.…

    • 9903 Words
    • 40 Pages
    Powerful Essays
  • Good Essays

    When people think about privacy and the internet, what do they think? Do they feel secure? Or, do they feel vulnerable when it comes to using the internet at their house or in a public place? The answer to some of these questions may surprise people because some think they are completely safe at home on their home networks. But the truth is, your security/privacy is taken advantage of on the daily basis by companies and third parties.…

    • 756 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Choosing Firewall

    • 902 Words
    • 4 Pages

    We can use the internet for news, map, email, video chat, websites, music, blogs, research, online banking, business transaction, social engineering, sharing photos etc. We can do all these by sitting in front of PC which is connected to the internet. These are the many advantages we can take from internet but there are some disadvantages too. There are Trojan horses, worms, viruses, hackers etc. They are made to disrupt the computer network or personal computer. They can be biggest threats for our computer anytime while using the internet therefore keeping away from those malicious attacks we need to have best level of protection for our PC and home network. They can steal our bank account information, Social Security number without our knowledge. We do trust our anti-virus software they can detect the file which is trying to infect our system but they are not capable of filtering all the traffic and monitoring unauthorized access to home network or PC. In that case we need a firewall to keep our PC protected. Firewalls can be hardware, software or a combination of both.…

    • 902 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    intrusion of a computer network can result in the loss or unauthorized utilization or modification…

    • 5484 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    How to Crack a Website

    • 1306 Words
    • 6 Pages

    A recent security survey reported that 20% of home PC 's are infected with viruses and over 80% contained spyware and adware. Frightening figures.…

    • 1306 Words
    • 6 Pages
    Powerful Essays