Question

In: Computer Science

Discuss any (5) threats faced by computer network users and what strategies might be used to...

Discuss any (5) threats faced by computer network users and what strategies might be used to prevent each of them from happening.

the instructions of that question are

1- 1000 word or above

2- set references (book, www, journal article from the full-text databases, current affairs magazine, newspaper )

please with the references

Solutions

Expert Solution

THREATS

1. TROJAN HORSE

Trojan Horse is a malware that tricks the user by inserting an attacking code secretly into any legitimate app or a software. When the user installs the app and run it, it get access to the computer. Trojan horse virus can be often enter the system when the user click on a spam mail which has a severe warning, on false advertisements or download any application from unauthroised website.

Torjan horse can access your data like passwords, sensitive data, webcam etc.

PREVENTION:

1. Avoid opening or downloading attachments from spam mail or any mail from unknown people.

2. Avoid installing fake software or software from illegal websites. Install only apps that has a good review and those are reliable.

3. Avoid clicking advertisements in the websites.

Reference:Borders, Kevin R. "Method, system and computer program product for detecting security threats in a computer network." U.S. Patent No. 8,079,080. 13 Dec. 2011.

2. COMPUTER VIRUS:

Computer virus are one of the most common threats to cybersecurity. In day to day life, most of the house hold computers would have affected with some type of malware atleast once. They often enter into the PC through email attachments, or by an unknown software installed in the system. They can affect the computer by sending spam, corrupt and steal sensitive data, or it can also delete contents in the hard drive.

PREVENTION:

1. Avoid opening suspicious spam mails and install attachments. Avoid clicking pop up advertisements
2. Install Anti virus softwares, anti malware programs to protect the system.
3. All the latest models of the PC has built in anti virus protection. Make sure they are always on.

Reference: S. Natarajan and S. Rajarajesware, "Computer Virus: A Major Network Security Threat," International Journal of Innovative Research & Development, vol.3, no. 7, pp. 229-302, 2014

3. PHISHING

By duplicating a trusted third party, Phishing gathers infomation about sensitive data such as usernames, passwords, credintials etc. It is a cyber attack where the user get tricked by beliving any mail and opening it. In the name of any bank or a note from any company name, it tries to enter the system. When user believe that the mail is originally sent by any bank and opens the malicious link, it will automatically install malware on the user's computer.

PREVENTION:

1. Avoid clicking links from spam mail. Always check the spelling of the URL before opening it

2. Always keep an eye on redirects from any website. The redirected website may contain suspicious softwares that gets automatically installed in the computer.

REFERENCES: M. Fire, R. Goldschmidt and Y. Elovici, "Online Social Networks: Threats and Solutions," in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 2019-2036, Fourthquarter 2014, doi: 10.1109/COMST.2014.2321628.

4. DOS AND DDOS ATTACK :

In Denial of Service attack, the attacker targets on the website. Any website or any organisation's website will be flooded with packets where the website gets more requests than usual than the server can handle. And thsu making the website to go down.

In Distributed Denial of Service, it comes from more than one source at the same time. It is generated by using thousands or more unsuspected machines. Those machines can be distributed all over the world, and are called as Botnets. The victim cannot defend against it since the attack will be coming from different IP addresses.

PREVENTION :-

1. Safeguard DNS servers. Buy more bandwidth  

2. Install anti-DDOS network hardware against DDOS attacks,

3. Install DDoS protection appliance

REFERENCES: Shrivastava, Gulshan, Kavita Sharma, and Swarnlata Rai. "The detection & defense of DoS & DDos attack: a technical overview." Proceeding of ICC. Vol. 27. 2010.

5. SPYWARE

Spywares are already installed in softwares and when the user installs it, it will secretly record any computer network activity. Spyware can steal passwords, Bank pin, and other sensitive data and sent the collected data to the attacker. It can reduce the performance of the operating system. It can never be detected . The data collected through the spyware will be sold to the third parties.

PREVENTION:

1. Install only trusted softwares from trusted websites.

2. Avoid clicking pop up advertisements

3. Install Firewall

4. Avoid clicking suspicious mails and links from mail.

REFERENCE: Tasril, Virdyra & Ginting, Meiliyani & Mardiana, Mardiana & Siahaan, Andysah Putera Utama. (2017). Threats of Computer System and its Prevention. International Journal of Scientific Research in Science and Technology. 3. 448-451.


Related Solutions

List and briefly discuss five threats to a computer network
List and briefly discuss five threats to a computer network
The largest benefit to a computer network is the ability to share information. Threats to health...
The largest benefit to a computer network is the ability to share information. Threats to health care networks are becoming prominently prevalent. You are working as a nurse educator in a large hospital system. Nurse educators have been centralized however; are required to travel to the organizations regional facilities. Educators use their smartphones and i-Pads to interact and share data and information. What are the first steps you would take to secure these exchanges? Describe why each step is important....
Two major computer threats to a system are hackers and viruses. Dfines cybercrime as any criminal...
Two major computer threats to a system are hackers and viruses. Dfines cybercrime as any criminal action perpetrated primarily through the use of a computer. 1. Using search engine on the Internet, find a current article (one written within the last 3 years) about a computer hacker or a computer virus. Give the site address, and the article title and author and date. 2. Write at least 5 sentences summarizing the article making sure to list any details about the...
Discuss any FIVE (5) benefits generated by the value delivery network of the online retailers. Provide...
Discuss any FIVE (5) benefits generated by the value delivery network of the online retailers. Provide your clear justification on the benefits. (400 WORDS)
Discuss any FIVE (5) benefits generated by the value delivery network of the online retailers. Provide...
Discuss any FIVE (5) benefits generated by the value delivery network of the online retailers. Provide your clear justification on the benefits.
1. Why is it important for mobile workers and users to know what the risks, threats,...
1. Why is it important for mobile workers and users to know what the risks, threats, and vulnerabilities are when conducting remote access through the public Internet? 2. Why does the mock XYZ Health Care Provider need to define a remote access policy to properly implement remote access through the public Internet? 3. Why is a remote access policy definition a best practice for handling remote employees and authorized users who require remote access from home or on business trips?...
Discuss in your own words the primary users of healthcare statistics and what they are used...
Discuss in your own words the primary users of healthcare statistics and what they are used for. Do you think there are too many statistics? Are they useful or are they a waste? As a health information professional, how can healthcare statistics be beneficial to you and provide an example.
discuss the possible threats of changing positioning strategies of the same brand to its target market....
discuss the possible threats of changing positioning strategies of the same brand to its target market. support your answer with examples
Discuss any one of these strategies. Vertical Integration Strategies or Outsourcing Strategies. Why should a company...
Discuss any one of these strategies. Vertical Integration Strategies or Outsourcing Strategies. Why should a company choose to or not implement any of these strategies?
1. Discuss any FIVE (5) benefits generated by the value delivery network of online retailers. Provide...
1. Discuss any FIVE (5) benefits generated by the value delivery network of online retailers. Provide your clear justification on the benefits 2. Discuss FOUR (4) improvements needed on the value delivery network of online retailers to further enhance their competitive advantages. Provide examples in your explanation.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT