Words of Wisdom:

"Do your best and forget the rest - Vickram Bahl" - Uselesspoliceman

Cyber Th

  • Date Submitted: 10/30/2011 09:15 AM
  • Flesch-Kincaid Score: 47.3 
  • Words: 899
  • Essay Grade: no grades
  • Report this Essay
Cyber security has become critical component in securing the day-to-day operations nearly every organization in business today. Security threats like viruses and worms and the software needed to cope with them, such as Symantec’s Norton Antivirus, have become familiar to business employees, as well as students and grandmothers.   In general sense, security can be considered as a state of freedom from a danger or risk. The goal of the security is to be able to defend against these attacks and ensure that the organization or a system will survive in the event of an attack.
Along with viruses, one of the biggest threats to computer users on the internet today is malware. It can hijack your browser, redirect your search attempts, serve up nasty pop-ups, track what web sites you visit, and generally cause serious damage to your computer or organization. Malware programs are usually poorly-programmed and can cause your computer to become unresponsive to the commands.
A system can get infected by malware in several ways. Malware often comes bundled with other programs (i.e., KAZAA, and other peer-to-peer sharing software). These malware programs usually pop-ups ads, sending revenue from the ads to the program’s authors. Other are installed from websites, pretending to be software needed to view the website. Unfortunately, getting infected with malware is usually much easier than getting rid of it, and once you get malware like a worm, it tend to spread itself to other computers by attaching itself to programs and emails.
Email security is becoming very critical. The email security threats may be of many different types. Email security can be compromised by spoofing, identity theft, and attacks by modifying existing messages, and imposters. Hackers may use any or all these methods to break into a user’s computer.
Email security is one of the most potent sources for losing our data because most people are complacent about enforcing email security. Email software is also...

Comments

Express your owns thoughts and ideas on this essay by writing a grade and/or critique.

  1. No comments