StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Threats to Computer Security - Essay Example

Cite this document
Summary
The paper "Threats to Computer Security" describes that with information regarding the recent attack releases as well as the current and viable protection measures, individuals are better placed to avoid falling trap to the tricks of the attackers and cybercriminals…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Threats to Computer Security
Read Text Preview

Extract of sample "Threats to Computer Security"

Computers have always been a major target for security threats. Thus, the issue of computer security is very diverse such that it is not easy to cover. This is because, the threats to computer security range from cyber crimes to computer crimes and internet crimes, as well as computer privacy issues. The following are the major, recent computer security threats:

Blended threats

This refers to a combination of spyware and malware attacks on a computer. This is the major current threat, where the attackers are blending malware software with spyware software and sending them to individual emails or chat rooms in the form of a URL link (Trend Micro, 2008). Once an individual clicks on the link, it directs to a website where malware software and virus is downloaded into the individual computer, in addition to downloading and installing spyware that captures sensitive information from the computer (US-CERT, 2012). Thus, the blended threat is more fatal than other forms of threat, since it entails the damage of an individual’s computer, while at the same time allowing for the tracking of sensitive information by the attackers, who can later use it for their benefit. Additionally, blended threats are more difficult to combat, since any activity on the link sent by the attacker will cause harm to the computer in one way or the other (Trend Micro, 2008).

Mobile threats

With the increase in technological advancement, mobile technology has not been left out. Sophisticated mobile devices are being produced each day, allowing users to access information from the internet at the click of their phone button. This has motivated cyber criminals to venture into targeting mobile devices, where they have developed files that are easily transferrable through email, MMS, Bluetooth, and even text messages (Trend Micro, 2008). The files are developed in the form of attractive and appealing high-tech mobile applications, which will immediately catch the attention of mobile users and call on them to install them (US-CERT, 2012). However, once such applications are downloaded and installed, they capture sensitive information from the mobile device and disrupt its operations. They are eventually transferred to other mobile devices through texts, MMS, and Bluetooth and cause the same harm to the other devices.

Phishing scam

This refers to major malware campaigns that have been launched to target individual computers, which occur in the form of attackers sending electronic greeting cards that contain malware (Trend Micro, 2008). The attacker has also developed attack files informing of attractive and enticing free screensavers, which contain malware files. Once an individual download and installs the screensaver, the malware is transferred to the individual’s computer, where they cause its malfunction (US-CERT, 2012). Additionally, phishing scams have been developed in the form of credit card information applications or online shopping advertisements that seek to capture an individual’s credit card information, for theft purposes (Trend Micro, 2008).

Measures to protect individual’s computer from these attacks

Maintaining updated anti-virus and anti-malware

Computer security calls for the vigilance of the individual using the computer. Therefore, notwithstanding that anti-viruses and anti-malware do not fully protect the computer from external threats, it is essential to maintain them updated and activated at all times. This is because; they play a great role in protecting the computer from certain external threats, leaving the computer owner with few threats to tackle (US-CERT, 2012). Therefore, the computer owner should consistently upgrade their anti-virus and anti-malware to the recent versions, which include more protective features (Vacca, 2009).

Use of firewall

Configuring and maintaining a firewall in place is essential. A firewall is the most recognized form of protection for a computer from external software attacks since it is developed with features that block any access to the internal computer network services (Vacca, 2009). Additionally, firewall settings provide the computer owner or user with the option to configure settings that enhance file sifting, allowing it to protect the computer and block incoming threats through its packet filtering capabilities (US-CERT, 2012).  

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer security Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Computer security Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1462657-computer-security
(Computer Security Essay Example | Topics and Well Written Essays - 750 Words)
Computer Security Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1462657-computer-security.
“Computer Security Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1462657-computer-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Threats to Computer Security

Potential security threats on a home personal computer

computer security, John Wiley & Sons Quarantiello, L.... This paper will discuss the various potential threats to such computers as well as how criminals succeed in effecting them.... This paper will discuss the various potential threats to such computers as well as how criminals succeed in effecting them.... Potential security Threats on a Home Personal Computer Personal computers have continued to gain popularity in most of our homes especially due to affordability as well as technological advancements in most business enterprises and organizations, which allow ecommerce....
2 Pages (500 words) Essay

Management information system

Trojan horse attacks are one of the most serious Threats to Computer Security.... In the industry of computer sciences and technology, the term computer security refers to the methods and procedures to ensure that the data that has been stored in the computer cannot be used by an unauthorized individual.... Most of the measures for computer security involve encryption of data and using of passwords.... computer security is often associated with the three core ideas or concepts which can be summarized as Confidentiality, Integrity and Authentication....
8 Pages (2000 words) Essay

Physical Security Related to Computer Systems

This kind of physical security can also be referred to as computer security or cybersecurity or logical security in which information is protected by operating systems and special software from unauthorized access.... Physical security related to computer systems is particularly explained.... The paper is a discussion about the first layer of security called physical security.... An introduction has been given as to what does physical security means in general and in particular in terms of computer information systems....
8 Pages (2000 words) Term Paper

Computer System Safety Standard

omputer system safety includes software protection, processes safety, site safety, and computer security itself.... System safety generally involves the security and reliability elements within a computer.... All these technological changes are controlled potentially by a computer, making a computer system the most delicate device in the world, and, therefore, a lot has been done to make computers more reliable and safe by implementing security measures that protect their environs (Leveson, 38)....
5 Pages (1250 words) Research Paper

Computer Security Threats

As the paper "computer security Threats" tells, computer security threats are capable of interfering with the normal functioning of computer systems.... These include the use of computer firewalls, installation of up-to-date Antivirus setups, and ensuring tight security and restricted access to the computer and network systems.... computer virus is a code segment that is capable of replicating by possibly attaching copies of it to existing executable files, implying that viruses can exist in a computer without infecting the system; not unless one opens or runs the malicious program....
2 Pages (500 words) Essay

Virtualization and Security

Subsequently, the paper explores domineering strategies that effectively eliminate potential threats to virtualized infrastructures.... The paper "Virtualization and security" discusses that most of the organization nowadays adopts the method of storing data in the virtual server instead of using a physical server.... The user needs to install security control measures such as data encryption, segregation of duties, use of passwords and other measures to prevent data loss....
9 Pages (2250 words) Essay

Cyber Crime National Strategic

The paper "Cyber Crime National Strategic " presents that mission-critical aspect of the current trend of physical and electronics computer security and, at a later stage, also examines the future trends that could emanate from computer usage in the 21st Century.... hus, it is necessary computer security systems work well, but in the event of a crisis, this could be severely put under test.... lso, regular computer security mock exercises need to be conducted to make the employees acquaint themselves with such crises and remain operationally competent and fighting fit to tackle any emergency, small or big....
5 Pages (1250 words) Term Paper

Developing a Security Plan

The author of the paper "Developing a security Plan" will begin with the statement that information security is the safeguarding of information and information systems.... Information security protects such information from any tampering or damages.... Thus, information security is necessary to prevent all this.... Some areas requiring information security include network security, business stability planning, record security, and information systems auditing....
15 Pages (3750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us