Network Security (Viruses and Phishing)
Network Security
Computers can get viruses like living things. A common way computers get viruses is when the user opens an e-mail and is tricked into downloading and running an application, unknowingly installing a virus (Vahid & Lysecky, 2019). Computer users can also get viruses by visiting unsecured websites and using peer-to-peer file transfer applications with viruses attached. Viruses wreak havoc on a computer's operating system. Computers with viruses may run slower, crash frequently, and have missing files (National Cybersecurity Alliance, 2023). The computer may have to be wiped clean, and the operating system reinstalled to remove the virus.
Thankfully, there are ways one can protect themselves from getting a computer virus. One of the best ways to prevent viruses is by downloading trusted antivirus software. "Antivirus software is a program that looks for known viruses and strives to disable found viruses by searching a hard drive, and by monitoring visited websites and downloaded files" (Vahid & Lysecky, 2019, ch. 8.2 para. 3). Another way to prevent accidentally installing a virus is by always using trusted websites and software. Computer users can get viruses by visiting unsecured websites and using peer-to-peer file transfer applications that have viruses attached.
Phishing is a trick hackers use to get the user's personal information. The scam comes in the form of an e-mail. Although e-mail applications have security to filter for potential phishing attacks, they can still get through. Phishing is possible due to human error. The phishing schemes are designed to look like legitimate e-mails. For example, the e-mail could be designed to look like a charity. The user then enters their personal information and bank account information. After that, the scammers have the user's information. There may not be any noticeable symptoms on one's computer, but they will notice it in their accounts. Hackers take the user's personal information to access their bank accounts or open other accounts in their name. For businesses, a security breach due to phishing can lead to trade secrets and customer data being stolen.
One way to protect oneself against phishing is to open trusted e-mails and be aware of what phishing looks like. Some specific features of phishing e-mails include file attachment(s) the recipient did not request or expect, poor spelling or grammar, inconsistent or spoofed sender address, and requests for sensitive or personal information (IBM n.d.). Another way to protect oneself from phishing is to enable spam filters and e-mail security software. Spam filters and e-mail security software use data on current phishing scams and machine learning algorithms to recognize suspected phishing e-mails and other spam, then move them to a separate folder and turn off their links (IBM, n.d.). This ensures that the user does not see the e-mail in the first place as it goes to the spam folder. Additionally, if they were to click on the link, it would be inactive, so the user can not access the page and give up personal information.


Comments
Post a Comment