Free Essay

Casestudy Wk3

In:

Submitted By Bigtim10
Words 577
Pages 3
To be honest a way I am going to describe the potential security threats to a computer is just telling how to avoid them at all cost. One of the most ways to damage a computer is Malware. Just from me knowing a little bit about a computer I learned that Malware is malicious software such as viruses, worms and spyware. Therefore all computer users should know that Malware can cause your computer to loss a lot of important information in which you thought was secure.
Firstly, I believe another threat to a computer is viruses, which can do a numerous of types of damage to any device. Viruses can send spam, also provide criminals access to your computer and disable your security settings. How do you know if your computer is infected? It takes longer than usual for your computer to start up. I just had this problem with my laptop. I had to send it in to Apple. One more thing is that programs are running without your control.
Secondly, Spam is something I see on the internet everyday I use my computer. I think spam is unsolicited messages and advertising banners. The one place I see spam the most is when I login to my email everyday to check my mail. It’s true that spam is very annoying if let it bother you on a daily basis.
Furthermore, some attacks a hacker may use to gain access to your computer without you knowing about is huge if you don’t know anything about it. IP spoofing is an attack a hacker may use to fake a IP address so the receiver think it is sent from a location where it is not actually from. Another hacker technique I heard of is Password cracking which is used to get a password from a user or administrator on a network.
Finally, Trojan Horses is malicious program I am very familiar with because I see this all time when I am on the internet just browsing and notice something downloading without me doing it. One of the things Trojan Horses can do is use anyone computer to hack other computers. So by learning about this by doing research for this topic I will make sure any computer I use in the future will always be fully secure with any type security I can use for my device.
In conclusion, I must say I learn a lot from doing research on this topic but I know it will take me sometime to figure out a plan to keep my computer running perfectly from now on. So I know now that there are a lot of different ways someone can access your personal files on a computer or any technology device. Hackers will always fine a way to access something they want but it is our job as consumers to make sure we can get someone to setup up a firewall or anti-virus software on our device to protect ourselves.
References
Sanchez, M. (n.d.). The 10 most common security threats explained. Retrieved January 30, 2016, from http://blogs.cisco.com/smallbusiness/the-10-most-common-security-threats-explained
Dreams, P. (n.d.). Ten Computer Security Threats That Can Cost You A New PC . Retrieved January 30, 2016, from http://www.pcsndreams.com/Pages/Articles/PC_Threats.htm
Gregg, M. (n.d.). The Technical Foundations of Hacking. Retrieved January 30, 2016, from http://www.pearsonitcertification.com/articles/article.aspx?p=462199

Similar Documents