Question

In: Computer Science

Using appropriate literature, properly discuss a specific security threat, and recommend appropriate solution(s). The topic discussion...

Using appropriate literature, properly discuss a specific security threat, and recommend
appropriate solution(s).
The topic discussion should include at least the following:
▪ Explanation of the security threat.
▪ Impact of the security threat.
▪ Recommended solution
___________________________________________
I choose the topic is : ( computer viruses )

I NEED ONLY THE FITST POINT IS Explanation of the security threat + make sure include distinction between viruses and other typed of malware.

Solutions

Expert Solution

Phishing

Phishing attacks are nothing but sending the fradulent communictaions tthat appear to come from a reputable source.Usually It is done through email.Its main intension is to steal sensitive data like login information and credit cart information, or to install malware on the victim's machine.Its a common type of cyber attack

Impact of the Phishing threat

The impact of this Phishing threat includes data and identity theft, confidential information exposure,and costly reputation and monetary damages. FBI estimates over 2.3 billion USD was lost as a result of specialized type of Phshing threat between early 2013 and 2016.

Recomended solution

Anti-spyware and firewall settings should be used to prevent this attacks and users should update the programs regularly. Firewall protection prevents access to malicious files by blocking the attacks. ANtivirus sofware scans every file which comes through the internet to your device.It helps to prevent damage to your system.

Hope this will help you.


Related Solutions

Database Design and Management Question: Discuss the security needs of DBMS solution. Recommend a comprehensive but...
Database Design and Management Question: Discuss the security needs of DBMS solution. Recommend a comprehensive but high-level security management plan for the design.
. Recommend appropriate data analytic techniques for security prevention at IMC.
. Recommend appropriate data analytic techniques for security prevention at IMC.
Recommend appropriate data analytic techniques for security prevention at IMC. [5 marks]
Recommend appropriate data analytic techniques for security prevention at IMC. [5 marks]
Week 2: Search for Literature and Levels of Evidence. This week's graded discussion topic relates to...
Week 2: Search for Literature and Levels of Evidence. This week's graded discussion topic relates to the following Course Outcomes (COs). CO1 Examine the sources of evidence that contribute to professional nursing practice. (PO 7) CO2 Apply research principles to the interpretation of the content of published research studies. (POs 4 and 8) Reflect on your practice, and identify a significant nursing clinical issue or change project that you would like to search for evidence in online sources. Formulate searchable,...
1. discuss a review of the literature specific to "environmental health" and the pathophysiology. 2. discuss...
1. discuss a review of the literature specific to "environmental health" and the pathophysiology. 2. discuss current evidence-base nursing intervention for environmental health 3. develop a nursing care plan for "environmental health" by creating a case scenario 4. discuss how the care plan meets at least one objective in healthy people 2020 and the implication for nursing practice
In the strategy and marketing literature there is continual discussion of the product life cycle. Discuss...
In the strategy and marketing literature there is continual discussion of the product life cycle. Discuss each of the four stages of the product life cycle: • Start-up • Growth • Maturity • Harvest which system of product costing would be most useful for decision making and control, and why. Explain briefly in your answer possible alternative organizational structures at each stage in the life cycle.
In this discussion, you will engage in discourse about specific content from this topic. In the...
In this discussion, you will engage in discourse about specific content from this topic. In the next topic, you will then complete a follow-up activity based on this discussion. 1. After reviewing the Ford Pinto Case Study answer the following questions. If you were the CEO of Ford would you have made the modification to the Pinto to make it safer (and lost revenue) or would you have kept crossed your fingers hoping no one else was injured (thus keeping...
For Aira, discuss what the appropriate security and controls should be for the device
For Aira, discuss what the appropriate security and controls should be for the device, for a smart phone app that reads the device, and for a web site where device readings can be stored and shared with medical personal. Note: Your device may not currently support all three of these options. If not, assume that such enhancements have been made for the device/system.
Discussion Topic: Discuss the major aspects of water regulation in the body.
Discussion Topic: Discuss the major aspects of water regulation in the body.
One of the assumptions made by economists is that firms maximise profits. Using appropriate diagram/s, discuss...
One of the assumptions made by economists is that firms maximise profits. Using appropriate diagram/s, discuss the long run and the short run profit maximization behaviour in a perfectly competitive market and in a monopoly. In your conclusion you should comment on whether a perfectly competitive market or a monopoly is better for society and why.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT