Essay on Security Week 4 Case Study

799 Words Jul 1st, 2014 4 Pages
Security Threats And Attacks
Week 4 Case Study
Dustin Soria
Security Threats And Attacks
Week 4 Case Study
Dustin Soria
2014
2014

Recent statistics show that a large percentage of people have the idea that computer security is an issue that only affects organizations. Many people believe that, at a personal level, there is little that one can have to do with their information especially because they don’t see if someone will need their information. In contrast, there is a lot of useful information that a third party may obtain from a personal computer that the user may not even realize. For instance, a user may have sensitive information that would lead to his or her private life, secrets, or even important financial
…show more content…
A Trojan horse can spread to other programs, turning them into Trojans as well. (What are viruses, worms, and Trojan horses?, 2014) Spyware and Ad-ware are the next ventures. Spyware is software that is installed secretly onto a computer without the user’s knowledge. It will monitor the user’s activity or interfere with the user’s control over a personal computer. (The 11 most common computer security threats) Just like with Viruses, there is anti-Spyware programs available that can combat spyware. Ad-wares are usually attached to a program that is a freeware or shareware. Even though the program itself is free, the manufacturer of the program still makes money from selling the information the ad-ware gathers from your computer. The easiest way to prevent ad-wares from being on your computer is to not download and install free software or programs that you do not trust. If you have to have the program installed, make sure you use a firewall to help monitor the incoming and outgoing traffic. Now how do hackers get into your system? Hackers can use something called a “Key Logger”, which is a device or program that records all the real time activity of a computer user including the keyboards keystrokes they make. In turn, obtaining access to personal information and accounts from the logins and passwords obtained. Hackers can also obtain access through

Related Documents