Tuesday, October 8, 2019
Computer security Essay Example | Topics and Well Written Essays - 750 words
Computer security - Essay Example Once an individual clicks on the link, it directs to a website where a malware software and virus is downloaded into the individual computer, in addition to downloading and installing a spyware that captures sensitive information from the computer (US CERT, 2012). Thus, blended threat is fatal than other forms of threat, since it entails the damage of an individualââ¬â¢s computer, while at the same time allowing for the track of sensitive information by the attackers, who can later use it for their benefit. Additionally, blended threats are more difficult to combat, since any activity on the link sent by the attacker will definitely cause harm to the computer in one way or the other (Trend Micro, 2008). Mobile threats With the increase in technology advancement, mobile technology has not been left out. Sophisticated mobile devices are being produced each day, allowing the users to access information from the internet at the click of their phone button. This has motivated the cyber criminals to venture into targeting mobile devices, where they have developed files that are easily transferrable through email, MMS, Bluetooth and even text messages (Trend Micro, 2008). ... They are eventually transferred to other mobile devices through texts, MMS and Bluetooth and cause the same harm to the other devices. Phishing scam This refers to major malware campaigns that have been launched to target individual computers, which occur in the form of the attackers sending electronic greeting cards that contain malware (Trend Micro, 2008). The attacker have also developed attack files inform of attractive and enticing free screensavers, which contains malware files. Once an individual downloads and installs the screensaver, the malware in transferred to the individualââ¬â¢s computer, where they cause its malfunction (US CERT, 2012). Additionally, phishing scams have been developed inform of credit card information applications or online shopping advertisements that seek to capture individualââ¬â¢s credit card information, for theft purposes (Trend Micro, 2008). Measures to protect individualââ¬â¢s computer from these attacks Maintaining update anti-virus a nd anti-malware Computer security calls for the vigilance of the individual using the computer. Therefore, notwithstanding that anti-viruses and anti-malware do not fully protect the computer from external threats, it essential to maintain them updated and activated at all times. This is because; they play a great role in protecting the computer from certain external threats, leaving the computer owner with few threats to tackle (US CERT, 2012). Therefore, the computer owner should consistently upgrade their anti-virus and anti-malware to the recent versions, which include more protective features (Vacca, 2009). Use of firewall Configuring and maintaining firewall in place is essential. Firewall is the most recognized form of protection of a computer from external software attacks, since
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.