6. Network Security
There are many reasons why it is essential to have computer security for individuals or organizations. The customers' safety is the number one priority for companies specializing in information security. It's vital to have software to fight unwanted hackers to obtain any confidential information. Information system security is one of the most critical assets nowadays since much of our personal information is accessible through the internet and computer devices.
Risk
Management is vital for releasing new technologies for consumers
to use. "Risk management is the process that allows IT managers to balance the
operational and economic costs of protective measures and achieve gains in
mission capability by protecting the IT systems and data that support their
organizations' missions (Stoneburner & Feringa, 2002). Users need to rely on the computer to safeguard their information and find ways to
protect themselves. For example, passwords, two-step verifications, and security
questions can help keep their data safe. Learning how to store essential
data can help individuals and organizations secure classified or
confidential information.
Users are aware that much of their personal data is accessible by anyone determined enough to go through intense hacking to obtain any information. Two examples of malicious hacking are phishing and spam emails. Phishing is one of the cheapest and easiest ways for hackers to gain access to a user's personal data. The user is being tricked into handing over any sensitive information by installing malware into their computers without their knowledge. Many users are sometimes unaware since phishing emails can come from trusted senders. It all starts with an attachment that redirects the user to a malicious website; once the site is loaded, the hacker can quickly get into the user's information.
On the other hand, spam emails are also another type of security
breach. A spam email is a malicious attempt to gain aces to one's computer. It
consists of mass quantities of emails which can be difficult to stop due to
botnets. These messages can also have malicious links and malware installed into one's computer.
Nowadays, there are many ways to protect personal information. Most apps require two-step
verifications that can give potential hackers two obstacles from gaining access to a user's account. There's also an anti-virus that
scans the computer for any malware and odd behavior, alerting the user and preventing the virus from spreading. It's essential to keep personal
information safe, or else one will suffer the consequences.
Reference
Stoneburner, G., Goguen,
A., & Feringa, A. (2002). Risk management guide for information technology
systems. Nist special publication, 800(30), 800-30.
Bulgurcu, B., Cavusoglu,
H., & Benbasat, I. (2010). Information security policy compliance: an
empirical study of rationality-based beliefs and information security
awareness. MIS Quarterly, 523-548.
Vahid, F., & Lysecky,
S. (2017). Computing
technology for all. Retrieved from zybooks.zyante.com/
Phishing.
IT Governance. (n.d.). Retrieved February 14, 2022, from
https://www.itgovernance.co.uk/phishing
Cisco. (2021, October
29). What is spam email? Cisco. Retrieved February 14, 2022, from
https://www.cisco.com/c/en/us/products/security/email-security/what-is-spam.html#~types-of-spam


Comments
Post a Comment