6. Network Security

 There are many reasons why it is essential to have computer security for individuals or organizations. The customers' safety is the number one priority for companies specializing in information security. It's vital to have software to fight unwanted hackers to obtain any confidential information. Information system security is one of the most critical assets nowadays since much of our personal information is accessible through the internet and computer devices. 

Risk Management is vital for releasing new technologies for consumers to use. "Risk management is the process that allows IT managers to balance the operational and economic costs of protective measures and achieve gains in mission capability by protecting the IT systems and data that support their organizations' missions (Stoneburner & Feringa, 2002). Users need to rely on the computer to safeguard their information and find ways to protect themselves. For example, passwords, two-step verifications, and security questions can help keep their data safe. Learning how to store essential data can help individuals and organizations secure classified or confidential information.

Users are aware that much of their personal data is accessible by anyone determined enough to go through intense hacking to obtain any information. Two examples of malicious hacking are phishing and spam emails. Phishing is one of the cheapest and easiest ways for hackers to gain access to a user's personal data. The user is being tricked into handing over any sensitive information by installing malware into their computers without their knowledge. Many users are sometimes unaware since phishing emails can come from trusted senders. It all starts with an attachment that redirects the user to a malicious website; once the site is loaded, the hacker can quickly get into the user's information.

On the other hand, spam emails are also another type of security breach. A spam email is a malicious attempt to gain aces to one's computer. It consists of mass quantities of emails which can be difficult to stop due to botnets. These messages can also have malicious links and malware installed into one's computer.

Nowadays, there are many ways to protect personal information. Most apps require two-step verifications that can give potential hackers two obstacles from gaining access to a user's account. There's also an anti-virus that scans the computer for any malware and odd behavior, alerting the user and preventing the virus from spreading. It's essential to keep personal information safe, or else one will suffer the consequences.

 

 

 

 

 

 

 

 

 

 

 

 

Reference

Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk management guide for information technology systems. Nist special publication, 800(30), 800-30.

Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 523-548.

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

Phishing. IT Governance. (n.d.). Retrieved February 14, 2022, from https://www.itgovernance.co.uk/phishing

Cisco. (2021, October 29). What is spam email? Cisco. Retrieved February 14, 2022, from https://www.cisco.com/c/en/us/products/security/email-security/what-is-spam.html#~types-of-spam 

Comments

Popular Posts