Explain three ways that computer users can be victimized

Assignment Help Other Subject
Reference no: EM133208110

Assignment - Security in Computer Systems Discussion

Task - Explain three ways that computer users can be victimized by computer security risks and computer crime. Explain each in detail. What can someone do to protect themselves from these risks?

Make sure to be detailed in your response and make sure to comment on at least two other student's posts.

Classmate post 1 -

The first, and easiest way in my experience to get victimized by a computer security risk is by opening an email from an unknown sender. When the email is opened, it opens a link, back door, or rootkit, that allows the virus or person to infect your computer or take control of it. There are reasons that require allowing someone else to control your computer from their location if you need tech support to help. An important way to prevent any hackers from joining in on the rootkit or infecting your email with viruses is to have a personal firewall, phishing filter, antivirus program previously installed prior to allowing access into your computer, or any device for that matter.

A second way to get a virus is through pop-ups. When the user clicks on a new site while researching, if the site is unprotected or requires the user to allow cookies, they are allowing access to their device via their website. A great way to protect against pop-ups is with adware, personal firewall, anti-spam programs, pop-up blockers, and web filtering software.

A third common way of getting victimized by a computer crime is simply hackers using a code breaker to get into your social media profiles. When an app is downloaded and linked to your Facebook account to share your progress in a game, that provides your basic personal information- name and email, or name and phone number, or more linked social media accounts. A way to prevent your social media accounts from being hacked into is by not opening messages from strangers, not accepting friend requests from people you do not know personally, and by not linking every game you enjoy playing to your accounts to share your progress. On a computer, your firewall, antivirus programs, spyware, adware, and phishing filters can prevent any online account of yours from being broken into. But on your phone, especially while using public Wi-Fi, these protection apps and software's are even more important. Some things might be safer to wait to open at home with a protected software installed and on your own IP address.

Class mate post 2 -

Unfortunately, at this point I think most of us have experienced some type of computer security fraud.

1. Phishing is when a scammer will send an email to you and usually, it looks legit. It usually has the name of a person or company you are already familiar with. Usually the email will contain a link or ask specific questions that will aid them in gaining access to sensitive information.Unfortunately, at work, I always have to be on the look out for these types of emails. I have been able to spot a couple and save our District the headache of being hacked. When I come across an email that seems odd, I forward it to our IT department and he checks it out and lets me know whether or not it's safe. Usually they are, but about two times they were real Phishing emails. IT then emails the entire District and instructs us to not open the following email from the said emailer. Boom, nightmare avoided! It is very important to have an excellent program and excellent employees who can spot these types of things. It is also important to educate yourself and staff on what this looks like and what to do if you come across it.

2. Financial Identity Theft comes in many forms, one of the most common being credit/debit card fraud. Hackers obtain your personal and financial data from your online shopping habits to hack into your bank account and steal funds. Alot of the time, the amounts are very small, 50 cents, or a couple of dollars but when theyre doing it to millions of unsuspecting victims, it adds up. My husband has had this happen to him a few times unfortunately. It helps to have a good bank that has good fraud detection services. Usually within a day or so, the bank should call you to go over your expenses to verify these odd transactions. If you cannot confirm that you made these purchases, they will shut down your cards and issue new ones. Having to delete your old cards from online shopping sites and bill pay is a hassle but thank goodness for the banks IT department that catches these hackers before you loose everything.

3. Malware is basically an infection that gets access to your computer and all of its information via fraudulent software, an unprotected computer, infected USB and other devices, etc.In the early 2000's there was a music app called Limewire. Not only was it illegally letting people have music for free but it was also notorious for giving your computer viruses. Back then, we didn't have all the music downloading apps that we have now like, Apple music, Spotify, Napster, etc. This was when we were barely coming into downloading music. No one wanted to buy CD's anymore, downloading was much easier and on Limewire you could do it for free, but it came with huge risks. Malware risks to your computer, the choice was yours! Anti-virus software also became more popular during that time. A good anti-virus program will keep you safe from Malware but also, staying away from fraudulent activity and sketchy websites will also go a long way.

Reference no: EM133208110

Questions Cloud

How australian extreme climates will change : Use CSIRO climate change projections to predict how Australian extreme climates will change.
Identify risks associated with the provision of support : Alison is training Barbara to support Mr Williams. While they are walking up the drive to his house, Alison and Barbara talk about what they will be doing.
Do you believe columbus was either a hero or heretic : Columbus Hero or Heretic Essay - Listen to the following Fresh Air podcast and discuss, do you believe Columbus was either a hero or a heretic and why
Find an example of an article that may be biased : Find an example of an article that may be biased, and explain what indicated a bias. Include the title and link for the article.
Explain three ways that computer users can be victimized : Explain three ways that computer users can be victimized by computer security risks and computer crime. Explain each in detail
What could the documents tell a digital forensic examiner : ccjs 420 University of Maryland - University College. What could these documents tell a digital forensic examiner about you and your activities?
Identify the major hardware and software components : CIS 599 Strayer University. Identify the major hardware and software components of your hypothetical e-commerce company's information systems infrastructure.
Write an investigation report about the written skills : Write an investigation report about written and oral technical skills that used in a software developer position and identify problem that drives investigation
How should the him department be involved in the process : Choose three (3) or more of the IM standards and discuss how you would ensure compliance with your selected standards. Include steps for a process for each stan

Reviews

Write a Review

Other Subject Questions & Answers

  Should mcdonalds undertake more responsibility

Should McDonalds undertake more responsibility (play a more proactive role) in their customers' health or this is just a matter of individual responsibility?

  PS1680 Clinical Perspectives on Psychological Disorders

PS1680 Clinical Perspectives on Psychological Disorders Assignment Help and Solution, University of Central Lancashire - Assessment Writing Service

  Analysis of scene spectral reflectances and vegetation index

LABORATORY - ANALYSIS OF SCENE SPECTRAL REFLECTANCES AND VEGETATION INDEX. Generate NDVI images from the CASI images

  The importance of monitoring the effect of technology

evaluate the importance of monitoring the effect of technology on workflow. Read a selection of your colleagues' responses.

  How model applies to competing pressures in your own life

One of the most well-known systems theories in psychology is Bronfenbrenner's ecological model. The model consists of several interrelated systems.

  Write explanation on how you might address the challenges

Completing an RFP can be a long process that requires planning and collaboration. Before delving into the details of the RFP, it is wise for administrators.

  How samuel adams has differentiated its utopias

Groceries for the Gourmet Palate No food, it seems, is safe from being repackaged to look like an upscale product. Samuel Adams' $120 Utopias.

  What are some of the complexities to proposing a solution

What are some of the complexities to proposing a solution to your chosen issue? What immediate actions need to be taken to implement the proposed solution?

  Define how you utilize statistical knowledge

Consider your organization or specialty area and how you utilize statistical knowledge. Discuss how you obtain statistical data, how statistical knowledge.

  Discuss about the active monetary and fiscal policy

To address six unresolved issues in macroeconomics, each of which is central to current political debates. Students are required to use information and tools that they have accumulated in their study of the text and evaluate both sides of those is..

  Why is democracy better for development

Democracies are more likely than authoritarian regimes to achieve goals of development such as economic growth, human and social development.

  Determine the prevention of residential burglary

BCJ 3701, The burglaries have no specific method of entry, but 17 of the 20 burglaries have occurred during the day.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd