Very
frequently, computer and network security is not really considered about until
a real problem occurs. By this time it might be too late because the violation
in security can cause massive and possibly damaging complications to your
computers. The data present in our computers can be exploited by unauthorized
invasions. Prevention of data theft like passwords, bank account numbers or
credit card information is vital to our day-to-day life as many of our
activities depend on the security of the data paths. Such data theft can lead
to identity theft. The most widely used attacks against a computer system are
malware, adware, phishing and many more.
Malware
Malware
is a shortened term for malicious software. Malicious software is precisely
designed to damage a computer or gain access without the owner actually knowing
it. There are numerous kinds of malware; worms, keyloggers, spyware, or any
kind of malicious code that penetrates a computer. Normally, the software is
reflected as malware based on the intent of the maker rather than its real
characteristics. There are numerous reasons that can make computers more
exposed to malware attacks. It could be because of the flaws in the operating
system design, running all of the computers on a network through the same
operating system (OS), giving unauthorized user permissions to the system or
network. It could also be because of using the Windows operating system as it
has gained more popularity throughout the years and it gets the most malware
written for it. The greatest defense from malware is to be cautious about what
email attachments one opens, be careful when using the Internet, do not open
unknown or suspicious websites, and make sure to install and maintain software
updates in your computer as they have new updates to block malware to fix bugs
and make sure to buy a quality antivirus program.
Adware
Adware
is a shortened term for Advertising Supported Software. Adware is used when
referencing any kind of program that downloads or shows unsolicited banner
commercials in the software being used. Adware is frequently shoved within
software a computer owner buys. The creators of these applications incorporate
added code that delivers the advertisements, that is viewed through pop-up
windows or through a bar that emerges on a computer screen. The explanation for
the adware is that it supports in recovering development expense and it also
supports to hold down the cost for the user. The adware has been critiqued
highly because it typically includes code that tracks the user's private
information and passes it on to third parties, without the user's permission or
awareness. There is antivirus software that is available in the market, which
can detect and remove spyware. Some of those antivirus software’s are
Kaspersky, ESET, AVG and McAfee.
Phishing
When
impostors through the Internet impersonate as a business to trick you into
giving out your private information, it is called phishing. In order to capture
the user’s login and password credentials, the imposters incorporate a URL in a
spam e- mail that links to a bogus Web site controlled by the imposter, but
that imitates the login page of some gaming, banking or similar site. This is
typically incorporated in some message telling that critical action is needed
by the user to validate their account, to avoid it from being locked. If the
users are insensitive and do not comprehend that they are being tricked, then
following the link and providing the requested specifics could surely result in
the imposters abusing the users account using the captured credentials.
Deleting emails and text messages that request you to verify or provide private
information like social security number, bank account numbers, credit card and
passwords would be the wise step to take as legitimate companies do not request
for this kind of sensitive information through text or email.
References
Case, D. W. (2013). Business Data Communications:
Infrastructure, Networking and Security (7th Edition ed.). Upper Saddle
River, NJ: Pearson Education, Inc.
DII Consulting. (2015, n.d n.d). Photo Credit: Computer
Repair: DIY Malware Removal. Retrieved February 04, 2016, from DII
Consulting – Computer Repair & Web Design: http://www.diiconsulting.com/computer-repair-diy-malware-removal/
Robinson, B. (2015, n.d n.d). Photo Credit: Decoding
Malware at Sonoma State. Retrieved February 04, 2016, from KRCB North Bay
Public Media: http://radio.krcb.org/post/decoding-malware-sonoma-state
Rouse, M. (2015, n.d n.d). Adware. Retrieved February
05, 2016, from Search Security TechTarget:
http://searchsecurity.techtarget.com/definition/adware
Symantec. (2010, n.d n.d). What is malware and how can we
prevent it? Retrieved February 05, 2016, from PC Tools by Symantec: http://www.pctools.com/security-news/what-is-malware/
No comments:
Post a Comment