Free Essay

Sec 280 Week 4

In:

Submitted By ggersh300
Words 734
Pages 3
There are many potentials security threats on a personal computer. These security threats are harmful to a personal computer because if successfully activated these attackers can retrieve your personal information and use it for their own use. These attacks can also slow down your personal computer and can eventually causing it to crash. If the computer crashes and you don’t have your information backed up somewhere you practically wont be able to retrieve your information. There are techniques that these attackers use to access information on your system.
Potential security threats start with people; people who create these threats are to blame. These people are called hackers and predators. Hackers and predators create security threats and malware. They are computer programmers who use these security threats and malware to victimize other people by breaking into their systems to steal, change or destroy information. This is known as cyber-terrorism. Due to these hackers and predators computers are vulnerable at any time. These people create things like. Computer virus threats, Spyware threats, Phishing threats, Internet Worms, Rootkit, Zombies, Browser Hijacker, Email Virus, Mousetrapping, Spam, and Adware. Out of all the computers security threats out there the most well known is computer virus threats. The virus is a program that alters how a computer operates. The virus replicates and executes itself, this usually does damage to your computer. Spyware threats are an undercover cop in a way because it monitors your online activity or it can install software without your permission to gain personal information. It does all that without you even knowing. Phishing threat is when a hacker attempts to steal information through email or instant messaging. They send emails or instant messages that look real to people or businesses. The hackers attempt to steal sensitive financial or personal information.
Internet worms effects computers that are on the same network; worms consume bandwidth and spread via your network. These worms can cause a server to crash, make a user’s files unusable or as known as corruption, or can create a backdoor on a target computer. Rootkit will run its utilities on your computer and you will not know its there because they avoid being detected. A rootkit can also create a backdoor on target computers, this allows a hacker to send things like spamming, emails or can use the target computer to preform a denial-of-service attack on servers. The way to detect a rootkit is to run a virus scanner while its not running. Zombies open a backdoor on your computer to allow hackers or predators to use the infected computer for malicious purposes without the owner’s knowledge. Browser hijackers have the knowledge to change your home page or search pages in your browser. Email virus can harm your computer when you open an email. Mousetrapping is when a website uses a script preventing the Internet user from leaving the website. Spam comes from your email and it’s the junk or bulk emails that comes from senders.
Attackers use social engineering to bypass technical defenses. The attackers persuade victims to release malicious things on your computer to benefit themselves. These attackers will tell the victims to open the following: malicious links, exploit-laden attachments and install malicious software. Attackers also have taking advantage of bugs in the web browser or in software that the web browser can invoke. Attackers exploit browser add-ons such as Flash and Java Runtime Environment (JRE).
These attackers have so many ways to penetrate a systems and its network. If we aren’t protected from these attacks then our lives can be ruined. The attackers are getting smarter and quicker due to the advances in technology and knowledge. There are so many options these hackers can choose from and we need to prepare ourselves in everyway possible. The way to do that is to keep your system up to date, have encrypted passwords, software protection on you system, be carful what web sites you browse and what emails you open up. The more secure you are with your system the better off you will be.

References
Computer Security Threats. Retrieved from http://www.webroot.com/En_US/consumer/articles/computer-security-threats Zeltser, L. Understanding Modern Computer Attack and Defense Techniques. Retrieved
From http://zeltser.com/computer-attacks-defenses/
Ten Computer Security Threats That Can Cost You A New PC. Retrieved from http://www.pcsndreams.com/Pages/Articles/PC_Threats.htm

Similar Documents

Premium Essay

Contracts in the Commonwealth of Puerto Rico

...Contracts in the Commonwealth of Puerto Rico LAW 421- Contemporary Business Law July 8, 2014 On week three of our course, we were ask to write a word paper on Contracts in the Commonwealth of Puerto Rico in which we will describe the contracts according with the following cases; * Muñiz v. COPAN, 113 D.P.R. 157 (1982) * Trinidad v. Chade, 153 D.P.R. 280 (2001) * Las Marías v. Municipio, 159 D.P.R. 868 (2003) First, we must define contract in order to understand what role they have in our business law. A business contract is one of the most common legal transactions one can be involved in when running or working on a business. No matter what type of business one may run, having and understanding contract law is the key to creating sound business agreement that will be legally enforceable in the event that a dispute may arises. A contract is a legally enforceable agreement between two or more parties that creates an obligation to do or not do a particular thing. The term “party” can mean an individual person, company, or corporation. Contracts are usually governed and enforced by the laws in the state where the agreement was made (Melvin, 2011). Depending upon the subject matter of the agreement (i.e. sale of goods, property lease), a contract may be governed by one or two types of state law. * The Common Law; the majority of the contract (employments agreements, leases, general business agreements) are controlled by the state’s common law made, form court...

Words: 1953 - Pages: 8

Premium Essay

Acc 578 Complete Course Acc578 Complete Course

...ACC 578 Complete Course Click below link for Answer http://workbank247.com/q/acc-578-week-1-to-week-11-discussion-and-assignmen/9694 http://workbank247.com/q/acc-578-week-1-to-week-11-discussion-and-assignmen/9694 ACC 578 Week 1 Discussion "Fraud  "  Please respond to the following: * From the e-Activity, evaluate the cause(s) of the fraud. Recommend a strategy that could have prevented the fraud. Support your recommendation with examples. ACC 578 Week 2 Discussion 1 "Data Analysis and Fraud Investigation" Please respond to the following: * Imagine that you have been hired as a fraud examiner to review the risk of fraud at a major retailer. Analyze the data analysis tools available to you and propose a plan for which tools you will use. Provide a rationale for your plan. ACC 578 Week 2 Discussion 2 "Audit Objectives and Computer Analysis" Please respond to the following: * You have been tasked by your audit manager to develop an audit plan of a major bank.  Propose the key elements of your audit plan and the end result you expect from implementing the audit. Justify the key elements you chose for the plan. * From the e-Activity, analyze the systems the company used and propose a computer analysis plan that would have detected the fraud. Support your analysis with examples.  ACC 578 Week 2 Assignment 1 Fraud Prevention and Detection Policy Due Week 2 and worth 160 points You are a senior accountant at a new start-up information technology company...

Words: 2341 - Pages: 10

Premium Essay

The Nature and Purpose of Financial Accounting

...QUESTIONS 1. a. False. Bookkeeping, the preservation of systematic records, is only one aspect of accounting. Accounting also involves structuring the information so that it can be used to evaluate the performance of the company and make decisions about the future. b. True. Accounting is designed around the tabulation of numerical information. Also, accounting data relate primarily to a company’s financial activities; information about personnel matters, community relations, etc. must come from other information systems. c. False. Managerial accounting information is used by internal users; financial accounting information is provided to external users. d. False. The balance sheet is a listing of a company’s assets, liabilities, and owners’ equity. The income statement reports net income which is the excess of revenues over expenses. e. True. Financial analysts closely follow large companies and publicly report any indications of unusual financial performance. Small companies are not followed by analysts, so investors must do more homework themselves. f. False. Accounting standards in the United States are set by the FASB. The IRS has no direct connection with financial accounting standards. g. False. The IASB (International Accounting Standards Board) is an international body formed to create a common set of worldwide accounting standards. h. True. A CPA (certified public accountant) is an accountant who has received college-level accounting training...

Words: 4644 - Pages: 19

Premium Essay

Pandora

...2011. When Mr. Westergren was asked the question what made him go public with Pandora, his response was that the IPO presented itself to them but they didn't have a particular plan. When you have certain level of confidence in your business, and when some liquidity is useful, those are the two principal drivers. Bridge Bank, National Association was the investment banker however, Crosslink Capital Inc., Pandora’s biggest stockholder, will sell an additional 4 million shares, according to the filing. Underwriters include JPMorgan Chase & Co. Morgan Stanley and Wells Fargo & Co. had a 30-day option to purchase an additional 2.1 million shares, potentially increasing Pandora’s proceeds to almost $280 million. Crosslink Capital will remain Pandora’s biggest shareholder. The company will hold 25 million shares, or about 13 percent of the outstanding stock, after the sale, according to the filing. “In January 2011, Pandora met with investment banks to consider a possible $100 million IPO. The company then filed with the SEC for a $100mm IPO on February 11, 2011 and officially began trading on the New York Stock Exchange with...

Words: 1039 - Pages: 5

Free Essay

Ping Sweeps and Port Scans

...Ping Sweeps & Port Scans: Potential Dangers and Defense Strategies THIS IS MY ORIGINAL WORK, PLEASE DO NOT SUBMIT IT AS YOUR OWN, BUT USE IT AS A GUIDE WHILE WRITING YOUR OWN… I REQUEST YOU TO GIVE ME AN “A” RATING ON THIS PAPER; THANK YOU!!! Insert Your Name Name of University SEC 280 Week 1 Insert Tutor’s Name 1st, October, 2012 Outline 1) Introduction (pg.3) 2) Ping Sweeps & Port Scans (pg.3) a) Ping Sweeps (pg.3) b) Port Scans (pg.4) 3) Recommendations & Conclusion (pg.5) 4) References (pg.7) Ping Sweeps & Port Scans While running businesses, owners must be aware of crucial security threats that their organizations are exposed to in order to formulate effective strategies of mitigating potential risks. Statistics show that there are numerous computer threats that can put an organization’s success in jeopardy especially if they are never detected and controlled beforehand. Examples of such threats are ping sweeps and port scans, which are actually nefarious computer activities that can be used by hackers and crackers to access sensitive business information (Teo, 2000; Wild Packet, 2002). Ping sweeps and port scans can possibly go unnoticed if security measures to detect and block them are not put in place and can have dangerous repercussions on a business. Fortunately, there are many ways through which organizations can detect and eliminate potential damages associated with the activities...

Words: 1200 - Pages: 5

Premium Essay

I Am Me

...ACC 3213: Intermediate Financial Accounting III, Fall 2013 Class Time/Room: Section 1: MW 12:00 – 1:50 PM A&E 0293 Section 2: MW 6:00 – 7:50 PM Science S205 Instructor: Kim Shima, PhD, MAcc, CPA Office: VBT 352 Phone/Voice Mail: 885-7176 E-mail*: kim.shima@csueastbay.edu Office Hours: MW 2:00-3:30 PM or by appointment Prerequisites: Acct 3212 or its equivalent with C- or better. Course Materials: Intermediate Accounting, 7th ed., Spiceland, Sepa, and Nelson CONNECT program (available with book purchase) PPT slides available on Blackboard site Basic Four Function Calculator (cell phones, iPods, and graphing calculators may not be used as a calculator on exams) Course Description and Objectives: This is the last course in a three-course sequence on intermediate financial accounting. The objectives of this course are to reinforce the fundamental knowledge developed in ACCT 3211 and ACCT 3212 and to continue to build the understanding on the theory and practice of financial reporting. During this course, we will cover topics such as income taxes, pensions and other post-retirement benefits, shareholders equity, share-based compensation, earning per share, accounting changes and error corrections, and the statement of cash flows (revisited). Homework and three exams are used to evaluate students’ understanding of the material. Special note: although the emphasis of this course is US GAAP, we are...

Words: 2030 - Pages: 9

Premium Essay

Fbla Business Calculations Practice Test

...today’s quote of 15 1/2. Disregarding other costs, what did she pay? A) $1,278.50 B) $ 996.50 C) $2,278.50 D) $ 976.50 2) Find the annual premium for a $1,000,000 hazard insurance policy if the rate is $0.492 per hundred. A) $4,720 B) $4,820 C) $4,920 D) $5,000 3) ERM Art Supply purchases linen paper with a list price of $15,500 with a chain discount of 35/20/15. What is the net price? A) $ 8,060 B) $ 7,750 C) $10,075 D) $ 6,851 4) Calculate the reconciled balance given the following information: Bank Statement Balance: $378.53 Outstanding Checks: $37.38; $52.85; $100.54 Service Charge: $10.00 Check Register Balance: $197.76 A) $207.76 B) $197.76 C) $187.76 D) $177.76 5) Taxi fare is based on a flat charge per trip of $8.00 plus $0.95 per mile or fraction thereof. In addition, wait time is metered and charged at $0.50 per minute or fraction thereof. John takes a taxi from his hotel to the airport. The distance is 31 ¼ miles. The taxi waited at 3 traffic signals for 45 sec., 55 sec., and 93 sec. John tipped the driver $5.00. How much did John pay for the taxi ride? A) $35.40 B) $40.40 C) $43.40 D) $44.69 6) Ms. Moon is a salesperson who is paid on a commission basis. She earns 6% commission on sales up to $10,000, 12% for sales over $10,000 up to $20,000, and 20% on all sales over $20,000. If she sells $23,500 this pay period, how much money does she earn? A) $1,300 B) $4,000 C) $1,800 D) $2,500 7) Anthony had a loan...

Words: 4687 - Pages: 19

Free Essay

Mba Cv

...VALUE CALL  MONTHLY REVIEW AND OUTLOOK  31 May 2011  The Market  Index 13,000 The Market  ‐ One Year Performance Volume Index Volume  (m) 400 300 200 11,000 9,000 100 0 31‐Aug 30‐Nov 1‐Mar 31‐May 7,000 1‐Jun The market was range bound coupled with thin volumes  for  most  of  the  month  under  review  before  activity  The Market ‐ May 2011 Index Volume (m) Turnover Index picked  up  over  the  final  10  days.    The  KSE‐100  Index  12,300 140 12,200 120 posted  a  minor  gain  of  65  points  or  0.5%  during  May  12,100 100 12,000 2011 to close at 12,123 while the KSE‐30 Index improved  11,900 80 by  only  46  points  or  0.4%  to  11,762.    The  average  daily  11,800 60 11,700 turnover during May 2011 was 71.39m shares compared  11,600 40 11,500 20 to  75.52m  shares  during  April  2011.    The  net  inflow  of  11,400 11,300 foreign  funds  according  to  NCCPL  figures  during  the  2-May 5-May 10-May 13-May 18-May 23-May 26-May 31-May month under review was US$26.36m while the fiscal year ‐to‐date  net  inflow  was  US$321.39m  and  the  calendar  STOCK MARKET DATA 29‐Apr‐11 31‐May‐11 %Chg. year‐to‐date net inflow was US$71.40m.  Bank AL Habib Ltd. (BAHL)  KSE‐100 Index KSE‐30 Index Shares Traded m           12,057.54           12,123.15           11,716.35           11,762.76              1,585.92              1,570.54 0.5% 0.4% ‐1.0% ‐20.7% ‐20.7% 0.3% 0.3% We  are  initiating  coverage  on  BAHL,  the  eight  largest ...

Words: 11784 - Pages: 48

Free Essay

Business Methods

...INDIAN FINANCIAL SYSTEM (IFS) – 3RD ASSIGNMENT 1. WHAT ARE MUTUAL FUNDS? -Mutual funds are investment strategies that allow you to pool your money together with other investors to purchase a collection of stocks, bonds, or other securities that might be difficult to recreate on your own. This is often referred to as a portfolio. The price of the mutual fund, also known as its net asset value (NAV), is determined by the total value of the securities in the portfolio, divided by the number of the fund’s outstanding shares. This price fluctuates based on the value of the securities held by the portfolio at the end of each business day. Mutual fund investors do not actually own the securities in which the fund invests; they only own shares in the fund itself. In the case of actively managed mutual funds, the decisions to buy and sell securities are made by one or more portfolio managers, supported by teams of researchers. 2. SEBI REGULATIONS FOR MUTUAL FUNDS? - Unit Trust of India was the first mutual fund set up in India in the year 1963. In early 1990s, Government allowed public sector banks and institutions to set up mutual funds. In the year 1992, Securities and exchange Board of India (SEBI) Act was passed. The objectives of SEBI are:-to protect the interest of investors in securities and to promote the development of and to regulate the securities market. As far as mutual funds are concerned, SEBI formulates policies and regulates the mutual funds to protect the...

Words: 2542 - Pages: 11

Premium Essay

Elementary Statistics

...CHAPTER 3 Describing Data: Numerical Multiple-Choice Questions 1. A scatter plot can illustrate all of the following except: A) The median of each of the variables. B) The range of each of the variables. C) An indication of outliers. D) Patterns of values. ANSWER: A 2. For the following scatter plot, what would be your best estimate of the correlation coefficient? A) -0.8 B) -1.0 C) -0.3 D) 0.0 ANSWER: A 3. For the following scatter plot, what would be your best estimate of the correlation coefficient? A) 1.0 B) 0.8 C) 0.3 D) 0.0 ANSWER: B 4. Calculate the correlation for the following (X, Y) data: (53, 37), (34, 26), (10, 29), (63, 55), (28, 36), (58, 48), (28, 41), (50, 42), (39, 21), and (35, 46). A) 0.710 B) 100.6 C) 0.670 D) 0.590 ANSWER: D 5. Suppose that we are interested in exploring the determinants of successful high schools. One possible measure of success might be the percentage of students who go on to college. The teachers’ union argues that there should be a relationship between the average teachers’ salary and high school success. The following equation of the regression line is obtained: “% of students going on to college = 13 + 0.001Average Teachers’ Salary” Which of the following statements is true? A) Increase % of students going on to college by 0.001 percent, we would expect average teacher’s...

Words: 12884 - Pages: 52

Premium Essay

Feasibillty Study by Backfriends

...I. EXECUTIVE SUMMARY * Name of the Business “Vegie Go Corporation” We decided to have the name “Vegie Go” because the nature of our business is producing healthy food products like our Ampalaya Nuggets. The word “Vegie” stands for Vegetables. Vegetables because Ampalaya belongs to it. And we all know that Ampalaya have so many vitamins that will help our body to be healthier. Thus, it gives us the idea to take it because we produce and enhance the bitterness that Ampalaya have and ensure the best quality that our customers seek for and to promote healthy and also affordable price. * Nature of the Business Our business focuses on producing healthy food like Ampalaya Nuggets. Ampalaya is rich in many vitamins like it is good source of vitamins A, B and C, iron, folic acid, phosphorous and calcium. Ampalaya is also rich in antioxidants that protect the cells of the body from damage of free radicals (metabolic by-products usually waste). And it prevents from diabetic. Even if the ingredient is Ampalaya we prevent the tastes of bitterness of it to encourage the people to eat our product. Other services are being supplied also to the Market Industries. * Location * SWOT Analysis Strengths: * Affordable price * Quality product * Accept whole/retail orders * Healthy products Weaknesses: * Other people don’t recognize the product made by Ampalaya * Competitors Opportunities: * School days * Celebrations * Wholesale...

Words: 5869 - Pages: 24

Premium Essay

The Legal Regulation of the

...THE LEGAL REGULATION OF THE EXTERNAL COMPANY AUDITOR IN POST-ENRON SOUTH AFRICA Hannine Drake THESIS PRESENTED IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF LAWS AT THE UNIVERSITY OF STELLENBOSCH Supervisor: Prof A.H. van Wyk March 2009 ii DECLARATION By submitting this thesis electronically, I declare that the entirety of the work contained therein is my own, original work, that I am the owner of the copyright thereof (unless to the extent explicitly otherwise stated) and that I have not previously in its entirety or in part submitted it for obtaining any qualification. Date: 25 February 2009 Copyright © 2009 Stellenbosch University All rights reserved iii ACKNOWLEDGEMENTS In acknowledgement to all who have contributed to this work in some form: writing this thesis would have otherwise been like swimming through mud. To my supervisor, Professor Andreas van Wyk, thank you for your leadership, patience, and academic skill in guiding me through the research process. To Adéle Mulder and Charl Marais, thank you for your continuous insight and perspectives, both academic and otherwise. And finally to Hilda and Gerrie Steyn, who have been absolutely crucial throughout all my years of study, thank you for your indispensable support, in all its forms. iv SUMMARY The worldwide increase of corporate failures on the scale of Enron and WorldCom has sparked a renewed international trend of corporate governance review...

Words: 50477 - Pages: 202

Premium Essay

Feasibillty

...I. EXECUTIVE SUMMARY * Name of the Business “Vegie Go Corporation” We decided to have the name “Vegie Go” because the nature of our business is producing healthy food products like our Ampalaya Nuggets. The word “Vegie” stands for Vegetables. Vegetables because Ampalaya belongs to it. And we all know that Ampalaya have so many vitamins that will help our body to be healthier. Thus, it gives us the idea to take it because we produce and enhance the bitterness that Ampalaya have and ensure the best quality that our customers seek for and to promote healthy and also affordable price. * Nature of the Business Our business focuses on producing healthy food like Ampalaya Nuggets. Ampalaya is rich in many vitamins like it is good source of vitamins A, B and C, iron, folic acid, phosphorous and calcium. Ampalaya is also rich in antioxidants that protect the cells of the body from damage of free radicals (metabolic by-products usually waste). And it prevents from diabetic. Even if the ingredient is Ampalaya we prevent the tastes of bitterness of it to encourage the people to eat our product. Other services are being supplied also to the Market Industries. * Location * SWOT Analysis Strengths: * Affordable price * Quality product * Accept whole/retail orders * Healthy products Weaknesses: * Other people don’t recognize the product made by Ampalaya * Competitors Opportunities: * School days * Celebrations * Wholesale...

Words: 5869 - Pages: 24

Free Essay

Messa V. Sullivan Court of Appeals, 1965. 61 Ill.App.2d 386, 209 N.E.2d 872

...Handout #2 Brief Training Materials for Fall 2012 Messa v. Sullivan Court of Appeals, 1965. 61 Ill.App.2d 386, 209 N.E.2d 872. BURMAN, PRESIDING JUSTICE. Betty Messa brought this action against James Sullivan, Helen Sullivan and the Keyman's Club, an Illinois not for profit corporation, to recover damages for the bodily injuries which she sustained as the result of being bitten by the defendants' dog. The complaint was based on two theories: first, a common law action for the keeping of a vicious animal and, second, an action based on what is commonly known as the "Dog Bite Statute" (Ill.Rev.Stat.l963, ch. 8, § 12d). The parties waived a jury and the case was tried by the court. On the common law count, the trial court held for the defendants because he found that the plaintiff was contributorily negligent. No appeal has been taken from the judgment entered on that issue. On the statutory count, however, the court concluded that the plaintiff should recover and therefore he entered judgment awarding the plaintiff damages only against James Sullivan and the Keyman's Club in the amount of $3,000. From this judgment these two defendants appeal. They contend that the plaintiff failed to prove, as she was required to prove in order to recover under the statute, that she was lawfully on the defendants' premises and that she did not provoke the dog to attack. Alternatively the defendants contend that...

Words: 5896 - Pages: 24

Free Essay

Salomon Case

...Harvard Business School 9-292-114 Rev. 12/17/92 Salomon and the Treasury Securities Auction In early June 1991, Salomon Vice-Chairman John Meriwether had a problem. The U.S. Treasury was inquiring about the possibility that Salomon had engineered a "squeeze" in the market for $12 billion in new Treasury notes auctioned on May 22, 1991. Ordinarily, the Treasury's concern over the possibility of a squeeze was not particularly problematic. Squeezes—that is, an unpredicted shortness of supply or high demand for a security—were not uncommon and developed for a variety of reasons. Unfortunately, Meriwether had reason to believe that one of Salomon's bond traders had recently violated the Treasury's auction rules. Paul Mozer, the managing director under Meriwether overseeing Salomon's trading in U.S. Treasury securities, had disclosed to Meriwether in late April that he had broken the Treasury's limit on the size of a dealer's bid in Treasury auctions. Mozer had admitted that he submitted a bid in a February auction using the name of a customer without authorization and had managed to buy more bonds than the Treasury guidelines allowed. The problem struck close to the heart of Salomon's business. Although Salomon was among the leaders in the traditional investment banking activity of debt and equity underwriting—acting as the intermediary between issuers of new securities (corporations and governments) and the investors who bought them—its trading in securities markets drove...

Words: 8102 - Pages: 33