Preview

Computer System: Security Threats and Defenses

Good Essays
Open Document
Open Document
651 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer System: Security Threats and Defenses
Security threats and defenses
Amanda Knight
BSA / 310
July 8, 2013
Ivon Young

Security threats and defenses The thing about not having any kind of anti-virus protection can destroy a computer’s system. You need to have an anti-virus protection on the computer so that you know the information that is stored is safe and also know that the virus will not crash your system. There are different types of things that can harm your computer, such as malware, adware, spyware, Trojan, rootkits, backdoor, and etc. I would recommend having some kind of anti-virus on your computer so that nothing will happen, it’s not saying this will not happen but you will have a better chance on it not happening to your computer if you put some kind of anti-virus on your computer and run a scan on a regular basics.
Social engineering is one type that you should watch for as a threat. This is a malicious user that will manipulate an organization’s member’s information. The attacker will use the information to bypass the security and access the confidential data that is stored on the system. The way this can happen is through e-mail, via phone, or even through instant messaging. The way you will know this is happening is because it will come in the form of hoaxes, phishing, or spam. The phishing attacks will be in e-mail, voice calls, or even social networks. The spam will come in three main forms that are called traditional spam, spim, and spit. The spam examples are like if you receive an e-mail from an unknown user that offers you a special offer and wants you to click some link to get the offer, another example is you answer a phone call from an unknown number and hear a recording saying that you qualify for a pre-approved bank loan and need your information to get the loan. An example of spim spam is where a user replies to an instant message in which they’re offered a free trial membership to some kind of program. Traditional spam is where attackers use spam as a way for

You May Also Find These Documents Helpful

  • Powerful Essays

    The aim of this report is to provide a practical study in order to determine, analyse and investigate market data through the use of the famous Fama-French three factor model (FF3). Moreover, this study will test the theory and will provide evidence of the anomalies discovered in relation to the variation in stock returns. Hence, in short the study will allow for the assessment of the effectiveness of the FF3 given the market data, and the discovery of the potential limitations.…

    • 4112 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft.…

    • 592 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    For common indications that a virus might be present, Administrators and users need to be on the alert for missing files or programs; unexplained changes to the system’s configuration; unexpected and unexplained displays, messages, or sounds; new files or programs that suddenly appear with no explanation; memory “leaks or unexplained use of disk space; and any other odd behavior of programs or the operating system. If a virus is suspected, a good antivirus program should be installed and run to scan the system for viruses and attempt to remove or quarantine any that are found. in case all these measures fail, all mission-critical or irreplaceable data should be backed up on a regular basis.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    CGS 3300 exam II

    • 439 Words
    • 2 Pages

    Anti-virus first thing you need to do to protect your computer it detects and eliminates the virus…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You will be able to recognize various motivations and vulnerabilities for exploiting a social network platform.…

    • 1245 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    * Is there a backup plan implemented for in case a virus does infect a computer or the network?…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In approaching preventative mechanisms that are effective against hacking, it is very important that both awareness and attitude is first changed, and then perceptions of information security and how to secure data must be allowed to…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

     I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Weak system security can cause massive problems for an organisation. Holes in security can allow hackers to gain access to an organisations data or its customers’ personal information etc. Once this happens, drastic problems can be caused for the organisation; anything from severe loss of earnings, loss of customers or even bankruptcy if the problem is not taken under control quickly. I will talk about some of the products of having weak system security, and the problems that these can cause.…

    • 744 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Some risks that I have identified are social engineering techniques due to the excessive trust given to messages coming from friends, contacts or followed people within the OSN(Online-Social Network) identity theft and information leaking furthermore, spam sending and malware distribution through Social Networks are increasing at an incredible pace. They are not the only threats.…

    • 526 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Technical Support

    • 5642 Words
    • 16 Pages

    You need to use anti-virus software to protect your own computer, and to prevent your computer from being used to pass on infections to other…

    • 5642 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    There is a recently discovered vulnerability in the Local Security Authority Subsystem Service which can cause a denial of service attack if a hacker sends a packet containing malicious files during NTLM authentication. NTLM protocol refers to the Windows NT LAN Manager which is used to authenticate logons to PCs that are connected to the network.…

    • 2361 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    While there are many threats out there today many of these threats are almost always targeted towards anything to do with business and money because they are always looking to gain free access to money sources or a way to steal things from companies or customers who have done business with them in the past. I am going to choose a local Company which is a very big store chain here in my state and a good many other states around the area, it is called Wal-Mart, they offer everything from car parts, food, pet supplies, normal supplies for daily use, electronics, clothes, just about anything you can imagine they have it and along with an online store as well to ship from other stores or to ship to homes.…

    • 1196 Words
    • 4 Pages
    Good Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays