Network Security

 

Information and system security is crucial for individuals and organizations. Ensuring the safety of data is important because it could get into the wrong hands. Hackers could steal data to use for identity fraud, monetization, etc. Computer systems use security measures such as device locks, authentication factors, and firewalls to maintain privacy. According to TestOut Corp. (2024), “The field of information security uses the CIA Triad as its primary principles of security control and management. For information and systems to be considered secure, they must have all three of these properties: confidentiality, integrity, and availability”.

            Two computer security incidents that can disrupt data privacy are computer viruses and phishing or smishing. Computer systems are vulnerable to viruses because they replicate themselves and spread to other computers. They can cause damage and disrupt normal computer functions. This can result in data loss and leakage. Viruses can cause computer systems to run slower. They can cause unwanted pop-up windows. They can cause programs to shut down unexpectedly. They can log you out of accounts. Viruses can also cause your computer to crash. “In the early days of computers, viruses were spread between devices using floppy disks. Nowadays, viruses can still be spread via hard disks and Universal Serial Bus (USB) devices, but they are more likely to be passed between devices through the internet”, Fortinet (2025).

            There are several types of computer viruses. There are resident viruses that infect applications on a host computer. There are multipartite viruses that uses multiple methods to infect and spread across computers. There are direct action viruses that infects programs, files, and folders. There are ways to protect your computer system and prevent viruses from infecting your computer. You can use a trusted antivirus product. You can also avoid clicking pop-up advertisements you are not familiar with and clicking links that are not trusted.

            Computer systems are vulnerable to phishing or smishing because advertising and communication s so prevalent on the internet. Phishing and smishing both involve deceptive content being sent to trick the receiver into transferring damaging malware or leaking sensitive data. “While smishing and phishing attacks share these similarities, it’s important to remember that they utilize different attack vectors. Smishing attacks use text messages and mobile devices, exploiting their ubiquity and immediacy. Phishing attacks primarily occur through email or fraudulent websites”, Polatsek, M. (2024). Phishing and Smishing can both cause damage to computer systems. Phishing and Smishing can give hackers unauthorized access to bank accounts, credit cards, or other financial information. They can trick individuals into giving away personal information that can lead to identity theft. Phishing and Smishing can also lead to malicious links that give hackers access to the devise or plant malware. You can protect your device from Phishing and Smishing by most importantly being vigilant and skeptical. You can also prevent phishing and Smishing by enabling two-factor authentication.

 

 

 


Fortinet (2025). What are computer viruses? Retrieved from:

            https://www.fortinet.com/resources/cyberglossary/computer-virus

Polatsek, M. (2024). Phishing vs. smishing. What’s the difference? Retrieved from:

            https://cybeready.com/smishing-vs-phishing/

TestOut Corp. (2024). CertMaster Learn Tech+. http://www.testout.com

Comments

Popular posts from this blog

Computers in the Workplace

Documenting A Day