Sunday, May 12, 2019
Computer security Essay Example | Topics and Well Written Essays - 750 words
Computer shelter - Essay ExampleOnce an idiosyncraticist clicks on the link, it directs to a website where a malware software and virus is downloaded into the individual computer, in addition to downloading and installing a spyware that captures spiritualist development from the computer (US CERT, 2012). Thus, blended threat is deathly than other forms of threat, since it entails the damage of an individuals computer, while at the same time allowing for the track of sensitive information by the attackers, who can later use it for their benefit. Additionally, blended threats are more difficult to combat, since any activity on the link sent by the attacker will definitely cause suffering to the computer in one way or the other (Trend Micro, 2008). Mobile threats With the increase in engineering advancement, supple technology has not been left out. Sophisticated mobile devices are being produced each day, allowing the users to approach shot information from the internet at the click of their phone button. This has motivated the cyber criminals to venture into targeting mobile devices, where they feed certain files that are easily transferrable through email, MMS, Bluetooth and even text messages (Trend Micro, 2008). ... They are eventually transferred to other mobile devices through texts, MMS and Bluetooth and cause the same harm to the other devices. Phishing scam This refers to major malware campaigns that have been launched to target individual computers, which occur in the form of the attackers sending electronic greeting cards that contain malware (Trend Micro, 2008). The attacker have also developed attack files inform of attractive and enticing free screensavers, which contains malware files. Once an individual downloads and installs the screensaver, the malware in transferred to the individuals computer, where they cause its malfunction (US CERT, 2012). Additionally, phishing scams have been developed inform of credit card information applicati ons or online shopping advertisements that seek to capture individuals credit card information, for theft purposes (Trend Micro, 2008). Measures to value individuals computer from these attacks Maintaining update anti-virus and anti-malware Computer security calls for the vigilance of the individual using the computer. Therefore, in time that anti-viruses and anti-malware do not fully protect the computer from impertinent threats, it essential to maintain them updated and activated at all times. This is because they play a great role in protecting the computer from certain external threats, leaving the computer owner with few threats to tackle (US CERT, 2012). Therefore, the computer owner should consistently upgrade their anti-virus and anti-malware to the new-fashioned versions, which include more protective features (Vacca, 2009). Use of firewall Configuring and maintaining firewall in place is essential. Firewall is the most recognized form of guard of a computer from exter nal software attacks, since
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment