Network Security
Hello all!
One of the most important thing I have learned during my time in class is that businesses and individuals depend greatly on computer technology to carry out tasks, store information, and effortlessly access data through the web. Allen and Hallene (2018) point out that people are "interconnected" by technology now, more than ever, regardless of the risks associated with security breaches. A breach in security occurs when a user encounters unauthorized computer usage (Vahid & Lysecky, 2017), also referred to as spamming and hacking. Two forms of security threats include security holes in operating systems and phishing scams.
What is a security hole?
A security hole, or vulnerability in a computer, is triggered by a weakness in the computer's software, making it possible for hackers to access user information and cause harm with virtually no signs (Allen & Hallene, 2018). Computer systems are vulnerable to security holes when users do not download and install software/operating systems updates regularly. According to Allen and Hallene (2018), computer updates are vital for fixing problems with the software operation, adding new/improved features, and closing security holes.
Tips on preventing a security hole breach
A
way to prevent a security hole breach is to regularly install software and
operating system updates on both computers and mobile devices; however, do not
install the update as soon as it is released. Instead, wait a couple of days,
then evaluate user reviews about the new software. If everything is up to par,
download the update. If there are issues, wait for the developers to smooth out
the wrinkles and offer an updated software version.
What are phishing scams?
Unlike a security hole, where users generally have no control over a security breach, phishing scams are carried out by manipulating human behavior. One of the main characteristics of phishing scams is that they target user communication and circumstance (Be on High Alert for Spear Phishing Scams, 2021), making it easier for hackers to gain personal information. A phishing scam is carried out by observing user communication (generally via email), allowing hackers to get a general idea of who they can pose to gain personal information quickly. On many occasions, the hackers pose as a trustworthy company asking a client for "personal information, login credentials, or trade secrets" (Be on High Alert for Spear Phishing Scams, 2021, para.1). When the individual clicks on the link (generally in an email), they are directed to another web page nearly identical to the original. Once the user enters their credentials or personal information, the sign-in fails. However, this means the breach was carried out, and now the hackers have access to the account or credit card information. Other phishing cases include phone calls, text messages, and even letters in the mail that request personal information.
How to avoid phishing scams
According to Be on High Alert for Spear Phishing Scams (2021), any incoming information (text, calls, emails) from people requesting information needs to be scrutinized, and the legitimacy of the sender needs to be verified. A great way to avoid a phishing scam is to be vigilant and contact who you know to be the legitimate sender. For example, if you receive an email from your banking provider requesting account information to avoid account interruption, you should close the email and contact what you know to be an accurate phone number. This approach allows the user to confirm whether the email is authentic or not. Generally, the best rule in being "a wise internet user" is never to give out personal information by email, text, or phone call and to not respond to unsolicited email offers (Vahid & Lysecky, 2017, Sec. 8.4).
References:
Allen, J., & Hallene,
A. (2018). Privacy and security tips for avoiding financial chaos. American
Journal of Family Law, 32(2), 101-107. Retrieved from https://search-ebscohost-com.proxy-library.ashford.edu/login.aspx?direct=true&db=a9h&AN=131710043&site=eds-live&scope=site
Be on High Alert for Spear
Phishing Scams. (2021). Dakota Nurse Connection, 74, 9.
Retrieved from https://search-ebscohost-com.proxy-library.ashford.edu/login.aspx?direct=true&db=ccm&AN=149810097&site=eds-live&scope=site
Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from https://ashford.instructure.com/courses/85897/modules/items/4339049
Comments
Post a Comment