Free Sample: Computer System: Security Threats and Defenses paper example for writing essay

Computer System: Security Threats and Defenses - Essay Example

I would recommend having some kind of anta-plus on your computer so that nothing ill happen, It’s not saying this will not happen but you will have a better chance on It not happening to your computer If you put some kind of anta-plus on your computer and run a scan on a regular basics. Social engineering Is one type that you should watch for as a threat. This is a malicious user that will manipulate an organization’s member’s information.

The attacker will use the information to bypass the security and access the confidential data that is stored on the system. The way this can happen is through e-mail, via phone, or even through instant messaging. The way o will know this is happening is because it will come in the form of hoaxes, pashing, or spam. The pashing attacks will be in e-mail, voice calls, or even social networks. The spam will come in three main forms that are called traditional spam, spit, and spit.

The spam examples are like If you receive an e-mail from an unknown user that offers you a special offer and wants you to click some link to get the offer, another example Is you answer a phone call from an unknown number and hear a recording saying that you qualify for a pre-approved bank loan and need your Information to get the loan. An example of spurn spam Is where a user replies to an instant message in which they’re offered a free trial membership to some kind of program.

Traditional spam is where attackers use spam as a way for spreading viruses and worms, and then will launching attacks if they get a response from users so I would suggest not responding to them. The most effective way to prevent social engineering is to educate the users on the dangers to responding to any communication that is received from unverified or entrusted sources. You should provide training to employees on the dangers of non work related interaction with external sources. Another thing is that you can use technical preventative measures to guard against remote social engineering attacks.

The thing here that I am talking about Is the use of pop up blockers and anta spam software. The way to block these ads and pop ups Is by looking at the web browsers that you use and there should be a blocking function there to click to keep the pop ups from coming up. You want to attack in which malicious users attempt to deceive a company’s users into divulging information without their permission. The way to stop this is to educate users on the angers that can happen when responding to the communication from the unknown or unverified sources.

I would strongly recommend to also using some kind of anti- virus program to help this problem. The employees now should be well trained after the techniques here above are listed and talked about. Employees should have a grasp of the general security concepts and ways to secure the company’s network so that it will be a safe and successful company. The employees should Just follow the solutions on how to prevent all the threat that can happen and everything will run fine.