Thursday, June 20, 2019

Computer security Essay Example | Topics and Well Written Essays - 750 words

Computer surety - Essay ExampleOnce an individual clicks on the link, it directs to a website where a malware software and virus is downloaded into the individual reckoner, in addition to downloading and inst all(prenominal)ing a spyware that captures sensitive tuition from the computer (US CERT, 2012). Thus, blended threat is fatal than opposite forms of threat, since it entails the damage of an individuals computer, while at the same time allowing for the track of sensitive information by the attackers, who can later use it for their benefit. Additionally, blended threats are more difficult to combat, since any action on the link sent by the attacker will definitely cause harm to the computer in one way or the other (Trend Micro, 2008). Mobile threats With the increase in technology advancement, mobile technology has not been left out. Sophisticated mobile devices are being produced each day, allowing the users to access information from the internet at the click of their phon e button. This has motivated the cyber criminals to venture into targeting mobile devices, where they have developed files that are easily transferrable through email, MMS, Bluetooth and even text messages (Trend Micro, 2008). ... They are eventually transferred to other mobile devices through texts, MMS and Bluetooth and cause the same harm to the other devices. Phishing scam This refers to major malware campaigns that have been launched to target individual computers, which issue forth in the form of the attackers sending electronic greeting cards that contain malware (Trend Micro, 2008). The attacker have also developed attack files inform of attractive and provoke free screensavers, which contains malware files. Once an individual downloads and installs the screensaver, the malware in transferred to the individuals computer, where they cause its malfunction (US CERT, 2012). Additionally, phishing scams have been developed inform of credit card information applications or onlin e shopping advertisements that seek to capture individuals credit card information, for theft purposes (Trend Micro, 2008). Measures to protect individuals computer from these attacks Maintaining update anti-virus and anti-malware Computer security calls for the vigilance of the individual using the computer. Therefore, notwithstanding that anti-viruses and anti-malware do not fully protect the computer from external threats, it essential to maintain them updated and activated at all times. This is because they play a great role in protecting the computer from certain external threats, leaving the computer owner with few threats to tackle (US CERT, 2012). Therefore, the computer owner should consistently upgrade their anti-virus and anti-malware to the recent versions, which include more protective features (Vacca, 2009). Use of firewall Configuring and maintaining firewall in place is essential. Firewall is the most recognized form of protection of a computer from external software attacks, since

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.