Friday, June 7, 2019

Computer Security Risk for Home Users Essay Example for Free

Computer Security Risk for Home Users EssayThis history of reckoners started long to begin with it emerges in the 20th century. Computer was a man made device that acts as string from mechanical inventions and mathematical theories towards the modern concepts and machines formed a study academic ground and the basis that became a worldwide phenomenon.It is true that any great invention that is created to solve human lives will always have its oppose side that will serve as a prey to embellish and cause catastrophic impact in a perfect device. As ready reckoner became to replace human brains, business partners, our media devices, our financial advisors, connection to the world and calculating machine has also became our number one surety threat.According to the class textbook, A computer security risk is any event or action that could cause a loss of damage to computer hardware, software, data, information, or processing capability. (Vermaat, 2010) Some of these security r isks have caused users millions of dollars due to identity theft and at the same time computer has helped truth enforcement agent captured convicted felons.Computer Security risk can be classified into two main categories which are computer crimes and cybercrimes. Computer crime involves knowingly interfering with computer security which involves a deliberate act against the law and cyber crime is defined as Tradition t break through ensembley, crime has been defined as an intentional violation of the legal code that is punishable by the state. (Vermaat, 2010) Cybercrime has become a serious crime and the FBI as include this into their top three priorities. The perpetrator of cybercrime and computer crimes has fall into seven basic categories which are hacker, cracker, Script Kiddie, corporate spy, unethical employee, cyber extortionist, and cyber terrorist. Home users are mostly exposed to security threats today because they do not have the financial means to protect themselves an d also phratry users gestate their level of vulnerability is small.While the risks to standard home computer users are not as catastrophic in cost as those of small businesses and home office computer users, they are still substantial enough to not ignore. The cost in lost data, missed e-mails, and possibly the theft of your identity all are significant enough to warrant consideration. (EITS, 2008) It is better to spend few dollars now to take proactive measures to protect your computer and its information will out weight the time it will take to recover from the losses you likely will suffer without an adequate protection. There are several typical skilful issues and risks involving computer networks and computer users. One of which is a commonly used term called computer virus.A computer virus is potentially negative and electronegative computer programs that affects or infect a computer negatively by altering the way the computer works without the users knowledge or permissi on. Once the virus infects the computer, it can spread throughout the computer and damage crucial programs and folders in the operating system. Another computer threat for home users is a worm. The book defines a worm as a program that copies itself repeatedly, for example in memory of on the network, using up resources and possibly end down the computer or network.The third computer threat for home users is a Trojan horse this type of attack is derived and named after the Grecian myth and its define as a program that hides within or look like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike a virus or worm, Trojan horse does not replicate itself to other computers. (Vermaat, 2010) The last known computer or network risk for home users is rootkit define as a program that hides in a computer and allows someone from a remote post to take full control of the computer. Once the rootkit is installed author can execute programs, change set ting, monitor activity and access files on the remote computer. (Vermaat, 2010) How to care against Computer viruses and other MalwareHome users can take several precautions to help prevent intruders into their personal home computers and mobile devices from malicious infections. These programs can help chance upon problem that might affect home computers before they occur. Install a quality antivirus application such as, AVG, McAfee, Norton, and Avira antivirus programs are sufficient enough to protect a computer against virus and spyware infections. Some of these antivirus programs are provided for free, however may not be sufficient enough to protect a computer from virus and spyware infections Pro-grade antivirus programs modify more frequently throughout the day thereby providing timely protection against fast-emerging vulnerabilities, protect against a wider range of threats such as rootkits, and enable additional overprotective features such as custom scans. Install real -time anti-spyware protection is a way to have a real time program on a computer that will help protect against the skyrocketing number of spyware threats on a timely manner.Free antivirus program do not provide a real-time protection against Trojan and other spyware and that is why a fully paid antivirus protection is recommended. This fully paid program can detect problems before it occurs. holding anti-malware applications current is another way to protect a computer against viruses or malware. Antivirus and anti-spyware programs require regular signature and database updates. Without these critical updates, anti-malware programs are unable to protect PCs from the a la mode(p) threats. In early 2009, antivirus provider AVG released statistics revealing that a lot of serious computer threats are secretive and fast-moving. Many of these infections are short-lived, but theyre estimated to infect as many as 100,000 to 300,000 new Web sites a day.Computer users must keep their antivi rus and anti-spyware applications up to date. All Windows users must take measures to prevent authorize expiration, thereby ensuring that their anti-malware programs stay current and continue providing protection against the most recent threats. Those threats now spread with alarming speed, thanks to the popularity of such social media sites as Twitter, Facebook, and My blank (Eckel, 2009) Once an antivirus has been installed on a device it is crucial to realize a daily scans. This can be programmed directly by the owner to either perform a scan on a hourly bases, daily or monthly bases. The sheer number and volume of potential and new threats make it infallible that particularly inventive infections will outsmart security software. In other cases, users may inadvertently instruct anti-malware software to allow a virus or spyware program to run. (Eckel, 2009)Dont click on email links or hampers its a tune most every Windows user has perceive repeatedly If an email link looks f ishy, most likely it is, dont click it. Antivirus software will trigger a warning sign if a link appears to be dangerous to a computer system. Sometimes a distracted, trustful of friends or colleagues they know, or simply fooled by a crafty email message, many users forget to be wary of links and attachments included within email messages, regardless of the source. Simply clicking on an email link or attachment can, within minutes, corrupt Windows, infect other machines, and destroy critical data. Users should never click on email attachments without at least first scanning them for viruses using a business-class anti-malware application.As for clicking on links, users should access Web sites by opening a browser and manually navigating to the sites in question. (Eckel, 2009) The quote that says protection is better than recruit makes perfect sense even in the computer work. The only way to protect a computer is by playing it safe. Invest a puny after a purchase of a PC by buying a powerful antivirus protection to protect the PC from intruders. It is also very important to be very watchful of the type of programs you download or upload into the system. One of the advantages of having that extra protection for a PC is the auto scan survival thats offered by the antivirus program. The software will automatically scan all the files or virus that might cause a negative impact on the computer.BibliographyEckel, E. (2009, June 19). 10 ways to avoid viruses and spyware. Retrieved November 6, 2012, from A ZDNet Web Site www.techrepublic.com EITS. (2008). Retrieved November 6, 2012, from entsols www.entsols.com Finnie, T., Petee, T., Javis, J. (2010, September 22). Future Challenges of Cybercrime. Volume 5 Proceedings of the Futures Working Group , pp. 5-7. Vermaat, G. B. (2010). Discovering Computers Microsoft Office 2010. capital of Massachusetts Course Technology Cengage Brain.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.