Network Security





Network Security

            Security threats and vulnerabilities to the direct and instant technological advancement combined with the internet's ideas in our everyday, natural life, we are now highly dependent on technology. The purpose may vary to all characteristics of our world. Cyber thieves and criminals also move faster than most people on the internet by ensuring that information on computer methods is a primary target. Assets can be split up into tangible benefits and uncertain technical skills. "The cyber threat involves an outside element. But, computer vulnerabilities on the network asset. Vulnerabilities in computer security are not usually the result of an intentional attack. Though cybercriminals usually leverage these flaws in their attacks. However, you can reduce the risk of a data breach. That is by knowing the most common network vulnerabilities. And then find ways to address them. (Hudson, 2020)."

 Computers are vulnerable and can be harmed in many ways. There are several aspects where it can be presented, for example, computer viruses and email spam. A computer virus is a malware that infects and replicates itself through malicious corrupted code. Email spam has been known as a dishonest scheme for quite some time. Also known as a phishing scam is an attempt to bait users into sharing and obtaining sensitive information or data such as passwords, usernames, or credit card details. The adverse effects of phishing are that your private and personal information shared with others has been compromised. Operators are information properties.

Nevertheless, intangible assets refer to business status, product source, financial gains, business expansion, and rising power. Technology has an abundance of lawsuits involving cyber-related felonies. This has grown so much that it has shifted labor to safe protection to protect the self's property and assets. Computer security is the barrio to illegal computer entry involving seeing, altering, or damaging computer information. "Defenses against DoS attacks include detecting sources (like IP addresses) generating the attack and blocking requests from those sources before those sources' requests reach the server, such as blocking at a router. Companies may also contact law enforcement (the FBI in the U.S.) to track down the perpetrator. (Vahid, F., & Lysecky, S. 2019)."

 There are many ways to secure your computer from hackers. My first recommendation for protecting your computer system or network would be to install antivirus software. Installing an antivirus program on your computer will protect you from unauthorized code or software that may threaten your operating system. "Antivirus software plays a major role in protecting your system by detecting real-time threats to ensure your data is safe (Freedman, 2020)." The second recommendation would be to ignore spam. Beware of email messages from unknown parties, and never click on links or open attachments accompanying them.

References

Hudson, G. (2020). Vulnerability In Computer Security. Retrieved from Vulnerability In Computer Security | Cybersecurity Automation (cybersecurity-automation.com)

 Freedman, F. (Oct 20, 2022). How to secure your computer from hackers. Business News

Daily. https://www.businessnewsdaily.com/11213-secure-computer-from-hackers.html

 Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks Chapter 7:Chapter 8: Security


Comments