Network Security
Information
and system security is crucial for individuals and organizations. Ensuring the
safety of data is important because it could get into the wrong hands. Hackers
could steal data to use for identity fraud, monetization, etc. Computer systems
use security measures such as device locks, authentication factors, and
firewalls to maintain privacy. According to TestOut Corp. (2024), “The field of
information security uses the CIA Triad as its primary principles of security
control and management. For information and systems to be considered secure,
they must have all three of these properties: confidentiality, integrity, and
availability”.
Two computer security incidents that
can disrupt data privacy are computer viruses and phishing or smishing. Computer
systems are vulnerable to viruses because they replicate themselves and spread
to other computers. They can cause damage and disrupt normal computer
functions. This can result in data loss and leakage. Viruses can cause computer
systems to run slower. They can cause unwanted pop-up windows. They can cause
programs to shut down unexpectedly. They can log you out of accounts. Viruses
can also cause your computer to crash. “In the early days of computers, viruses
were spread between devices using floppy disks. Nowadays, viruses can still be
spread via hard disks and Universal Serial Bus (USB) devices, but they are more
likely to be passed between devices through the internet”, Fortinet (2025).
There are several types of computer
viruses. There are resident viruses that infect applications on a host
computer. There are multipartite viruses that uses multiple methods to infect
and spread across computers. There are direct action viruses that infects
programs, files, and folders. There are ways to protect your computer system
and prevent viruses from infecting your computer. You can use a trusted
antivirus product. You can also avoid clicking pop-up advertisements you are
not familiar with and clicking links that are not trusted.
Computer systems are vulnerable to
phishing or smishing because advertising and communication s so prevalent on
the internet. Phishing and smishing both involve deceptive content being sent
to trick the receiver into transferring damaging malware or leaking sensitive
data. “While smishing and phishing attacks share these similarities, it’s
important to remember that they utilize different attack vectors. Smishing
attacks use text messages and mobile devices, exploiting their ubiquity and
immediacy. Phishing attacks primarily occur through email or fraudulent
websites”, Polatsek, M. (2024). Phishing and Smishing can both cause damage to
computer systems. Phishing and Smishing can give hackers unauthorized access to
bank accounts, credit cards, or other financial information. They can trick
individuals into giving away personal information that can lead to identity
theft. Phishing and Smishing can also lead to malicious links that give hackers
access to the devise or plant malware. You can protect your device from Phishing
and Smishing by most importantly being vigilant and skeptical. You can also
prevent phishing and Smishing by enabling two-factor authentication.
Fortinet
(2025). What are computer viruses? Retrieved from:
https://www.fortinet.com/resources/cyberglossary/computer-virus
Polatsek,
M. (2024). Phishing vs. smishing. What’s the difference? Retrieved from:
https://cybeready.com/smishing-vs-phishing/
TestOut
Corp. (2024). CertMaster
Learn Tech+.
http://www.testout.com
Comments
Post a Comment