Question

In: Economics

List and briefly discuss five threats to a computer network

List and briefly discuss five threats to a computer network

Solutions

Expert Solution

1. COMPUTER NETWORKS: Computer viruses are pieces of software that are designed to be spread from one computer to another. They’re often sent as email attachments or downloaded from specific websites with the intent to infect your computer — and other computers on your contact list — by using systems on your network. Viruses are known to send spam, disable your security settings, corrupt and steal data from your computer including personal information such as passwords, even going as far as to delete everything on your hard drive.

2. PHISHING: Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. it can be very harmful and it considered as one of the most serious computer network threats. it creates more frauds and thus make a person financially insecure.

3. COMPUTER WORMS:

Computer worms are pieces of malware programs that replicate quickly. They are not very dangerous as peer say but they can spread from one computer to another. A worm spreads from an infected computer by sending itself to all of the computer’s contacts, then immediately to the contacts of the other computers. Thus it forms like a web of infected computers and spreads like a disease.

Interestingly, they are not always designed to cause harm; there are worms that are made just to spread via network. Transmission of worms is also often done by exploiting software vulnerabilities. these kind of harmful malware is easily spread and is experienced by many across the globe.

4. ADWARE: Any software that is designed to track data of your browsing habits and, based on that, show you advertisements and pop-ups. this is a very serious and profitable business idea. this is not illegal as it takes all your permissions and thus your data is manipulated for the other companies who want to sell their product via sites. Data breaching sis its one of the consequences. today data is every company's biggest asset and it is through frauds like these that they earn this data. Adware collects data with your consent — and is even a legitimate source of income for companies that allow users to try their software for free, but with advertisements showing while using the software.

5. TROJAN HORSE:

Trojan horse, or “Trojan,” is a malicious bit of attacking code or software that tricks users into running it willingly, by hiding behind a legitimate program. this is like hiding behind something catchy to harm.

They spread often by email; it may appear as an email from someone you know, and when you click on the email and its included attachment, you’ve immediately downloaded malware to your computer. Trojans also spread when you click on a false advertisement. this way it is very effective and their are less chances that you can identify someone doing it.

Once inside your computer, a Trojan horse can record your passwords by logging keystrokes, hijacking your webcam, and stealing any sensitive data you may have on your computer. this is very serious as it can harm you in a very effective manner without your knowledge.


Related Solutions

Briefly list and discuss the primary threats to complying with the Independence Rule of the AICPA...
Briefly list and discuss the primary threats to complying with the Independence Rule of the AICPA Code of Professional Conduct.
Discuss any (5) threats faced by computer network users and what strategies might be used to...
Discuss any (5) threats faced by computer network users and what strategies might be used to prevent each of them from happening. the instructions of that question are 1- 1000 word or above 2- set references (book, www, journal article from the full-text databases, current affairs magazine, newspaper ) please with the references
The largest benefit to a computer network is the ability to share information. Threats to health...
The largest benefit to a computer network is the ability to share information. Threats to health care networks are becoming prominently prevalent. You are working as a nurse educator in a large hospital system. Nurse educators have been centralized however; are required to travel to the organizations regional facilities. Educators use their smartphones and i-Pads to interact and share data and information. What are the first steps you would take to secure these exchanges? Describe why each step is important....
In your own words, briefly outline the five threats to auditor independence that stated in the...
In your own words, briefly outline the five threats to auditor independence that stated in the Code of Ethics and provide one example of each.
List and briefly discuss the five categories of descriptor variables for industrial marketing segmentation as described...
List and briefly discuss the five categories of descriptor variables for industrial marketing segmentation as described in the text.
List all five components of financial compensation plans, and briefly discuss each component’s objectives.
List all five components of financial compensation plans, and briefly discuss each component’s objectives.
List and discuss the 10 external areas that give rise to opportunities and threats?
List and discuss the 10 external areas that give rise to opportunities and threats?
Please discuss and list the services typically provided by a network.
Please discuss and list the services typically provided by a network.
List five advantages of making an S election. Briefly explain each item. List five advantages of...
List five advantages of making an S election. Briefly explain each item. List five advantages of making an S election. (Select all that apply.) A. Deductions, losses, and tax credits are separately stated and retain their character when passed through to the shareholders. These amounts may be subject to the various limitations at the shareholder level. This treatment can permit the shareholder to claim a tax benefit when it otherwise would be denied to the corporation (e.g., a shareholder can...
Identity and briefly discuss five sources of risk.
Identity and briefly discuss five sources of risk.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT