Why People Tend To Malware Risk Analysis

Superior Essays
Assignment #2 The reason why normal people tend to expose themselves to the malware risk is mostly due to their lack of knowledge or carelessness. For example, in the text it states that “many people ignore the content of the want to trust this applet?” and merely click trust. The problem is that unsuspecting people are not fully reading what these dialog boxes say and they will simply “allow any signed applet to run on their machine.” Also, it could be due to their lack of awareness when remembering certain website names. Basically, if a person types in a similar URL, but not the correct one it connects them to their own site. Lastly, the attacker can obtain a mailing list which would allow them to send emails containing their website …show more content…
It constantly would shut off and would have a blue screen that said it was dumping almost every time I was on my computer. I would have pop-ups appear all of the time and random videos would play suddenly. Eventually I got so sick of it I just bought a new laptop with a new security system. The creator of a virus can take many things from your computer. It has the ability-as mentioned before-to take passwords and credit card/security numbers. It also has the capability to shut down your entire computer system. It affects the hard drive and your computer is practically done. It could allow random ads and pop-ups to show up on your screen. Your computer could have little to no internet connection. Also, it then leaves your computer vulnerable and open to even more viruses or malware. People should be very cautious when entering their internet onto websites because it is almost impossible to know if your computer is going to be safe or not. Most people do not fully understand how many hackers and attackers there are on the internet, simply waiting for people to click their website or ad. It is hard to tell how secure that website is especially if you do not read the terms and conditions or dialog boxes …show more content…
I would regularly check up on the website to make sure it is taking me to the correct website, and if not inform someone. I would create another type of dialog box that would make the user clearly understand who is asking for access. It would include more than just who signed it and who authenticated it. I would probably add the website name and some other website information. Lastly, I would try not to make the website or ad name so generic. When people don’t know the name they type in a shortcut and that is what leads them to the false website. I would suggest making it a little more specific that way it might be easier for people to remember, rather than a common

Related Documents

  • Improved Essays

    The Win32/Sogou is a dangerous Trojan Downloader that invades the windows based PCs without getting permission from the user. This malicious application spreads through social media websites and can destroy a computer in a way that it becomes useless permanently. This tricky Trojan application is developed by the hackers to get remote access of the data and system folders in computer. Dalhousie University dataset contains both botnet and benign traces.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Professor Doupé, Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below: 1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware. 2.…

    • 682 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook (What is a Rootkit Virus?). Owners are able to implement files, monitor what’s being down on the computer and change the systems on the…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    If you don’t want your child going on a specific website, you could block that website. Parents would also have access to who their child is speaking with. For example, if your child was cyber bullied to the point where they committed suicide. Wouldn’t a watchful eye…

    • 202 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Also its fight against a huge group of spyware programs and stop its work, such as those that operate to capture images of the surface of your desk or use…

    • 253 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    The internet is a very dangerous place. Coben’s argument is that parents should use Spyware on their children, but to tell their children their using it on them. He talks about how dangerous the internet is for their kids and how parent should just help out and protect them from their dangers. Coben is right about how the internet is dangerous for their kids. He is saying how you, as a parent, should use Spyware on them but to tell them you’re using it on them.…

    • 334 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Peta V. Cal Analysis

    • 985 Words
    • 4 Pages

    49350 - Yourbrandsucks.com: Gripe Sites and Trademark or Copyright Infringement Complaining and poking fun seem to be a way of life for many. And, this passion of complaint and satire birth gripe sites across the web. The resulting mix produces foggy legal understandings and ramifications. Finding clarity through key cases helps resolve some of the gray.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s kids are focused more on technology. They worry more about their social life. They waste most of their time on their phone and internet uses, than going outside and playing. Spyware is a helpful tool when your children are wasting most of their time on the internet. It can help you see what your child is doing.…

    • 401 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Second, is to use the Drive by download. Users infected by web site that contain malicious ads. Because the ads have code that scans user 's system for vulnerabilities. The vulnerability can be exploited to cause the system to download malware and execute it. Finally, it infects the system with a data-stealing program.…

    • 1807 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    Coben’s claim is that parents should monitor their teen’s internet use by using spyware. I think it is wrong monitoring their teen online. One reason is that you are spying on your kid 24/7. Another reason is your teen would find a way to get on the internet and get pass spyware. It is also basically telling your kids I do not trust you on the internet…

    • 353 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Internet holds many hazards to young children and teens that many parents are not informed about. Many young children have the ability to sources that may or may not be reliable or hazardous, but without the proper instruction or understanding, they can get themselves in harm’s way. Without children or the parents of children being thoroughly informed puts them in risk of many hazardous possibilities in the future. Parents need to look over what their children are doing on the internet and inform and teach them the proper websites to use and avoid. There are internet safety classes available for both parents and their children to understand how to efficiently use the internet, avoiding any harmful occurrences.…

    • 771 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today in the health field there are many different types of technology that are a huge help to doctors, researchers, technicians and even the patients. New technologies consist of websites, computers, testing equipment, mobile devices, and many more things that are used daily in offices around the world. For example, some websites are used to keep the schedule for the day, month or even the year. No matter what the program is for, it helps the office stay on task and organized. Also the internet is a new technology that can help doctors have the answers right in front of the at all times.…

    • 1050 Words
    • 5 Pages
    Improved Essays