Security Organizational Software Essay Example
Security Organizational Software Essay Example

Security Organizational Software Essay Example

Available Only on StudyHippo
  • Pages: 8 (2099 words)
  • Published: April 26, 2017
  • Type: Case Study
View Entire Sample
Text preview

As software advances, the connection between human existence and computer technologies grows closer each year. Consequently, humans are utilizing these systems at an accelerated pace.

The increasing transfer and viewing of information over vast computer systems internationally affects both everyday browsing and sensitive processes like checking emails or accessing bank accounts. New technologies such as wireless connections and Bluetooth and Wi-Fi introduce potential flaws in computer security, creating vulnerabilities that attackers may exploit. Computer security experts continuously research ways to improve security in response to these developments.

With the ever-growing complexities and expenses, internet security has become a serious concern. Each year, new additions create more vulnerabilities to be exploited, making every computer connected to the internet a potential target for malicious attacks. These attacks not only aim to disrupt processe

...

s, but also steal money and information, which can be concerning considering the private nature of the data stored on computers. The top three security concerns on the internet include viruses (worms and trojans), spyware and malware, as well as spam. These issues have resulted in significant losses and investments. This paper outlines the vulnerabilities in computer network architecture, discusses existing attacks that are commonly utilized today, and explains how these attacks are executed.

The paper explores the users' role in computer security as humans are considered the weakest aspect of it. Being in control of the systems makes us susceptible to potential harm caused by determined hackers and attackers. They employ various tricks that can easily deceive individuals into activating malicious computer code.;Moreover, social networking sites and blogs have become a favored arena for virus writers to spread harmful code through widgets and software loaded o

View entire sample
Join StudyHippo to see entire essay

them.

Kelly Jackson Higgins' paper, "The Coolest Hacks of 2007," explores some of the most impressive hacks performed by hackers. These exploits have made people reconsider their security measures due to their proven feasibility. Case in point, in Sydney, Australia, hackers used wireless hacking to manipulate traffic sign messages, which was captured on video and published on YouTube. Another wireless attack involved a conventional toaster instead of a computer. Additionally, the development of a USB stick that can sniff Bluetooth signals makes Bluetooth hacking more accessible and affordable since previously it cost around $10,000 for the necessary equipment.

For approximately $30, it is now feasible to perform this task using a USB drive. Hackers can exploit wireless headsets, commonly used for eavesdropping on conversations and recording them digitally through the use of radio scanners. As new technologies rapidly emerge, computer security has become a complex science that demands time and comprehension. While it is impossible for anyone to master everything in cybersecurity, possessing basic knowledge can assist users in understanding how things function. Fortunately, there are numerous software security suites available on the market acting as anti-virus programs aimed at detecting and removing files that might potentially endanger a system.

Obtaining security software can be done through either a free download or purchase with the option to upgrade via a subscription plan. Upgrading enables virus definition updates from the database, which provide protection against all known virus patterns and immunity against new variants of harmful code. The program automatically detects any suspicious files, actions or processes on the computer and shields it from potential threats. Regular virus definition updates are necessary due to the rapid

emergence of new threats. Firewall software acts as a protective barrier around the machine and is essential for its security. It ensures that remote users cannot access the computer without passing through the firewall, which can be customized to allow or block specific connections.

Although firewalls cannot filter all attack types and anti-virus software may not detect every virus, it is recommended to have both running when a machine is constantly connected to the internet. Anti-virus software also provides users with the ability to limit outside connections. It's worth mentioning that hacking does not always involve malicious intent; some hackers aim to expose system vulnerabilities so companies can prepare for future attacks. Companies invest in securing their information because it is essential for maintaining integrity and neglecting security measures can lead to significant losses.

Coresecurity.com, a website focused on computer security, reports that a sole security breach can result in a loss of approximately $350,000 for companies. To guarantee system safety, it is crucial to perform regular penetration testing - a procedure that tests whether the system can be accessed externally. It becomes especially significant when the network becomes more intricate or modifications are made such as adding new nodes or applications, physically relocating, or installing new security software.

It's crucial to avoid losses caused by successful network breaches, which are classified as cybercrime. This type of crime involves various activities committed through electronic devices, but its definition remains vague and ambiguous due to the lack of laws passed by some countries. What may be considered a crime in one country could be considered legal in another, especially in developing countries with insufficient resources to investigate such cases

and offer protection to affected individuals. Cybercrime covers a vast range of acts, making it difficult to define precisely.

Due to the increasing popularity of electronic transactions and internet banking, stealing money can now be accomplished by remotely accessing a bank's resources and servers. This puts bank accounts at risk of being compromised, allowing funds to be easily transferred with just a few clicks. Despite banks improving their security systems, unnoticed security vulnerabilities may still be exploited by cunning attackers. Previously, unauthorized use of credit cards was enabled through software developers cracking credit card numbers that were discovered on the internet.

To improve security, a challenging new PIN number is required for credit card transactions. Cybercrime encompasses more than just monetary theft and may involve personal data misuse or identity theft. Unsecured communication between two parties can be intercepted by an unauthorized third party.

An unsecured connection enables snooping, allowing for easy interception of data packets during transmission. This can result in the theft of sensitive information like passwords, bank account details, and credit card numbers. The use of botnet armies is also on the rise - these are networks of infected computers that are controlled by a trojan known as a "Zombie". Its creator can issue commands from the channel to compromised PCs through an IRC server.

Infected machines known as zombies are commonly utilized to launch Distributed Denial of Service (DDoS) Attacks, flooding specific websites with useless packets of data. Should a website's bandwidth be smaller than the incoming barrage, it may become unavailable and fail to serve legitimate requests. The emergence of Web 2.0 has contributed to an increase in web security threats, empowering virus

writers to use online dating websites, social networking sites, and blogs as potential platforms for deploying their code. These sites contain valuable information that can be exploited for profit by malicious software which endangers the privacy of our online activities.

The internet can compromise personal privacy by collecting user information through software without their awareness. This data gathering is intended to tailor advertisements based on the user's interests, but it can also make users vulnerable to attacks. Attackers may deceive users into downloading certain software or visiting intrusive websites in order to gain access to secure computers. A notable example is the "I love you" virus that was attached to an apparently legitimate message and tricked many people into opening and running it.

Users can be tricked into opening potentially harmful software, containing viruses or trojans, through deceptive emails that offer tempting rewards or other attractive messages. Phishing is another form of attack where attackers deceive users to submit confidential information to fraudulent sources instead of legitimate ones. In such attacks, fake pages like a Yahoo login page are often utilized.

Sensitive personal information, such as credit card and bank account details, is not the only thing that can be stolen. Passwords and email accounts are also vulnerable to compromise. Furthermore, malware and spyware present a danger because they may appear harmless, making them undetectable by anti-virus software. These applications can track internet activity like browsing history and frequently used software. Removing malware and spyware can be more challenging than eliminating viruses, with some versions necessitating a complete operating system reformat for complete removal.

Although there are numerous options available to eliminate malware and spyware that remain undetected by

standard anti-virus programs, most anti-spyware solutions only target specific infections. Consequently, these solutions cannot guarantee complete protection against all spyware threats. To tackle this problem, users often rely on multiple software programs to secure their systems from malware in various forms such as spam advertisements that entice users into visiting websites. Malware can be more harmful than typical viruses because it consumes valuable system resources and is difficult to remove since it appears like legitimate software. Trojans imitate commonly-used applications such as games or utilities, making users vulnerable to attacks.

Although trojans may have different appearances and behaviors, they are all named after a specific code that can harm computer systems. The consequences of trojan viruses vary depending on the particular virus, but typically involve granting access to a remote computer or aiding in the acquisition and deployment of other harmful viruses. Trojans are generally small-sized and easily spread through networks. Though most known trojans can be identified by anti-virus software, new threats could arise undetected which could pose danger to computer systems.

In the realm of computer security, numerous software tools are at one's disposal. Payment is required for some, while others are free. With an abundance of options claiming superiority, it's vital to seek advice from experienced users before making any selections. Furthermore, certain online software that guarantees safety may actually contain malware and worsen the problem. As a result, prudence should be exercised when contemplating the installation or purchase of any software.

Outlined below are the commonly utilized computer protection tools. The AVG anti-virus free edition, which is the most downloaded software from cnet’s download.com, offers continuous system scans and virus defense with regular

updates. A vast number of users prefer this lightweight, helpful, and no-cost program.

This free anti-virus is different from security suites that consume a lot of disk space and RAM, making it appear like malware. It does not slow down your computer even while scanning it. Kaspersky anti-virus has good reviews from its users and is claimed to be more effective in detecting and eliminating threats. However, unlike AVG, Kaspersky anti-virus is only accessible for trial and needs subscription for further updates and use. Despite this, most users and experts recommend Kaspersky anti-virus. Another free application for Windows machines is the Secunia Personal Software Inspector. It helps determine missing files and security patches that could be essential to your system.

By adjusting your DNS settings to use OpenDNS, you can conveniently access advantageous features such as safeguarding against phishing sites and faster connection speeds. This tool is user-friendly as no installation on your device is necessary, ensuring online safety with ease. Although there are numerous anti-malware options accessible, none offer comprehensive protection.

Installing multiple anti-malware programs is recommended to detect all potential infections, but system performance should be taken into account. Ad-aware is a popular and effective spyware detection tool, while Spybot Search and Destroy blocks thousands of spyware variants and alerts you when any program tries to make significant changes to your registry. Additionally, LinkScanner Lite from Exploit Prevention Labs offers exploit prevention capabilities and can be integrated with both Internet Explorer and Firefox search engines.

By highlighting previously identified hacked pages, the text cautions against potential threats in search results. The dynamic nature of computer security, as a result of evolving network technologies, necessitates an ongoing

awareness and education of the various related developments. The adoption of new technologies should be approached responsibly, as insufficient knowledge could have negative consequences for individuals and organizations.

As we continue to learn about computer security, it is important to stay alert to new threats. Addressing these issues early will benefit us all. In my opinion, passing laws globally to take down businesses that hire people who create computer threats is necessary to completely eradicate the problem. Spam promotions, for instance, are paid for by businesses and blocking them with security tools only solves the immediate issue. Identifying the purpose behind and source of these threats is crucial to effectively combat them.

It is crucial for computer and internet users to ensure the internet's well-being. Spamming is responsible for a significant portion of bandwidth usage and online activity. Early intervention is necessary to prevent a significant increase in expenses in the future.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New