Wednesday, July 17, 2019

Cyber security threats Essay

Cyber holy terrors argon constantly evolving thereof increasing the need to hedge and cut down the security measures to get word that iodine is protect patch using the cyber blank. Cyber terrors be do more complex especially due(p) to the increasing globalization and use of cyber length in almost of the parts in the world. This has caused a major security threat which calls for better security measures inductance to reply some of the threats which atomic number 18 well nonionised by some individuals.Some of the major cyber threats involve phishing, adw be withal know as spyware, cyber shop and browsing, data safeguarding and to a fault threats a drug user faces slice using networking sites (AnonIC. org, 2004). vernacular cyber security threats, how to recognize and how avoid them matchless of the major cyber security threats is referred to as phishing which refers to the take in charge to get access to sensitive discipline which may include rallying c rys of other users, their user names and purge credit beleaguers.This is a criminal offense and is ordinarily carried by individuals who purport to be working with a renowned electronic communication entity which is trusted. Phishing is normally used to obtain credit card and bank account breeding of a soul therefore enabling the assailant to obtain m unrivalledy from a soul in a fraudulent manner. set security and spyware prevention software product program product butt jockstrap in lessen phishing (Warren, S2005).Spyware likewise referred to as adware is a nonher cyber security threat that faces the cyber space users. Spyware refers to a form of software that formerly butt ined in a calculator it may send an advert which redirects a cyber space users browser to some selected web sites. Once mavin logs into such webs, this enables the attacker to monitor the sites which are visited by the cyber space user. These are normally used by attackers mostly for venomed purposes.Some the symptoms which indicates that a computing device has been installed with spyware include originate up windows which are endless, redirection to a web site which is non the authorized atomic number 53 a psyche had antecedently typed in the browser, unpredicted toolbars which are rude(a) to a web browser of your computer, adjustment of search engine, error messages which are unremarkably random start appearing in the window of a computer and sharp changes in the home page of a browser among other symptoms. To avoid spyware installation to a computer, star should avoid clink links which appear on go up windows.This is because most of them are spyware products which once clicked their install the spyware governance in a computer. Closing the pop up windows would be essential in avoiding spyware installation. At times, unexpected questions may be posted in the pop up windows. Clicking no or cancel buttons would help in minify the endangerment of spyware installation in a computer. Adjusting the preferences of the browser may in addition be helpful in reducing the pop up windows as well as cookies in the computer (McKenzie, 2008). Social networking sites are also mostly targeted areas by attackers hence they pose great cyber security threats. strident messaging (IM) and trounce rooms are highly targeted networking sites which are used in obtaining personal development about a person. IM is mostly used within companies by employees to fancy constant communication. While IM usually involves one on one communication, chat rooms are more unsubtle and can be used by more that one person simultaneously. As such, while chatting, it is possible somebody else is pursuit your conversations thus posing greater risks of impersonification and also the study is not defend.For a person to hedge himself from such risks, he should install security measures in his browser ashes. unrivaled of the way one can go steady safe chatting, messagi ng or even browsing is by constantly adjusting the default option security setting in his computer. crippling all automatic downloads and limiting genuine interactions to only some users may help in reducing the cyber security threat. A person should also avoid uncover sensitive and vital culture to strangers. substantiative the person one is chatting or messaging is also beta in ensuring that the randomness one shares is made cloak-and-dagger.However, this may not be applicable especially in common chat rooms which are not restrictive. Updating the security software frequently is also vital in ensuring safe use of cyber space (National Cyber dapper System, n. d). While using social networking sites, one should remember that internet is usually public and unrestrictive. A person should thus hallow minimal information about his confidential information like addresses and bank accounts. creation skeptical about some information on the mail is also important in ensuring one is safe while using the networking sites.Some of the stories in the cyber space are usually false thus taking precautions is vital. Online shopping has grown tremendously especially due to globalization and the attendant introduction of e-commerce by most corporations. Online shopping gives attackers a chance of obtain information about a person. Financial blank space of a person is usually targeted by attackers who use such information to withstand their own fiscal pull ahead by selling the information or reservation other purchases using the information of buyers. data processors which are not protected from viruses are the most vulnerable to manipulation by attackers. It is easier to gain access to a computer which is not protected and obtaining vital information regarding a person. Fraudulent sites and also messages in the emails are also used in obtaining financial information of online shoppers. To get word safe online shopping, a person should ensure that an up to en gagement anti virus software is installed as well as an anti spyware software. This would ensure that Trojan horses and also viruses do not take away data or modify it in a persons computer.Updating web browser regularly by installing software patches would help in reducing the photograph of being attacked (National Cyber ready System, n. d). To reduce the risks of password alteration and monitoring by attackers, one should ensure that he evaluates the computers software settings regularly to ensure that the default settings are up to now in operation. Securing the web browser is also vital in ensuring safer cyber space custom by a person. Sensitive information sent via the cyber space should be protected with a password only known to the users.Passwords should also be updated and reviewed regularly to ensure they are secure and that the information contained in the computer is also secure (AnonIC. org, 2004). Practicing unspoiled home computing habits may also help in reducin g the risk of cyber security threat. This may be through with(p) by ensuring that the computer is locked always when one is using it. This would ensure that no unauthorized person is capable of tampering of with the information contained in the computer. Internet disconnection while not in use at home reduces the risk of virus attacks which are usually to monitor and modify a computer.The home security setting should be updated regularly as well as software updates. One should also ensure that the password being used for computer is not easy to guess by other people. Ensuring that there are no people in the vicinity keying in the password to the computer would help in protecting information contained inside the system (AnonIC. org, 2004). Conclusion Cyber crimes have been on the rise up with more and more cases being report daily. It is thus to take essential preventive measures to ensue that one is protected from cyber attacks. gritty technology being used by cyber attackers ha s also necessitated constant upgrading of the security measures one uses to protect his or computer system and network. Ensuring that a computer is always protected and have updated securing and passwords would help in reducing cyber security threats in the country. Reference AnonIC. org (2004) Computer earnest. Retrieved on 25th present 2009 from, http//www. anonic. org/computer-security. html. McKenzie, G. (2008) Recognizing and Avoiding Spyware. Retrieved on 25th March 2009 from, http//www. nationalcybersecurity.com/articles/144/1/Recognizing-and-Avoiding-Spyware/Page1. html. National Cyber Alert System (n. d) Cyber Security Tip Good Security Habits. Retrieved on 25th March 2009 from, http//www. us-cert. gov/cas/tips/ST04-003. html. National Cyber Alert System (n. d) Cyber Security Tip grounds Hidden Threats Corrupted Software Files. Retrieved on 25th March 2009 from, http//www. us-cert. gov/cas/tips/ST06-006. html. Warren, S. (2005) 12 steps to avoid phishing scams. Retrieve d on 25th March 2009 from, http//articles. techrepublic. com. com/5100-10878_11-5818568. html.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.