Explain three ways that computer users can be victimized

Assignment Help Other Subject
Reference no: EM133208110

Assignment - Security in Computer Systems Discussion

Task - Explain three ways that computer users can be victimized by computer security risks and computer crime. Explain each in detail. What can someone do to protect themselves from these risks?

Make sure to be detailed in your response and make sure to comment on at least two other student's posts.

Classmate post 1 -

The first, and easiest way in my experience to get victimized by a computer security risk is by opening an email from an unknown sender. When the email is opened, it opens a link, back door, or rootkit, that allows the virus or person to infect your computer or take control of it. There are reasons that require allowing someone else to control your computer from their location if you need tech support to help. An important way to prevent any hackers from joining in on the rootkit or infecting your email with viruses is to have a personal firewall, phishing filter, antivirus program previously installed prior to allowing access into your computer, or any device for that matter.

A second way to get a virus is through pop-ups. When the user clicks on a new site while researching, if the site is unprotected or requires the user to allow cookies, they are allowing access to their device via their website. A great way to protect against pop-ups is with adware, personal firewall, anti-spam programs, pop-up blockers, and web filtering software.

A third common way of getting victimized by a computer crime is simply hackers using a code breaker to get into your social media profiles. When an app is downloaded and linked to your Facebook account to share your progress in a game, that provides your basic personal information- name and email, or name and phone number, or more linked social media accounts. A way to prevent your social media accounts from being hacked into is by not opening messages from strangers, not accepting friend requests from people you do not know personally, and by not linking every game you enjoy playing to your accounts to share your progress. On a computer, your firewall, antivirus programs, spyware, adware, and phishing filters can prevent any online account of yours from being broken into. But on your phone, especially while using public Wi-Fi, these protection apps and software's are even more important. Some things might be safer to wait to open at home with a protected software installed and on your own IP address.

Class mate post 2 -

Unfortunately, at this point I think most of us have experienced some type of computer security fraud.

1. Phishing is when a scammer will send an email to you and usually, it looks legit. It usually has the name of a person or company you are already familiar with. Usually the email will contain a link or ask specific questions that will aid them in gaining access to sensitive information.Unfortunately, at work, I always have to be on the look out for these types of emails. I have been able to spot a couple and save our District the headache of being hacked. When I come across an email that seems odd, I forward it to our IT department and he checks it out and lets me know whether or not it's safe. Usually they are, but about two times they were real Phishing emails. IT then emails the entire District and instructs us to not open the following email from the said emailer. Boom, nightmare avoided! It is very important to have an excellent program and excellent employees who can spot these types of things. It is also important to educate yourself and staff on what this looks like and what to do if you come across it.

2. Financial Identity Theft comes in many forms, one of the most common being credit/debit card fraud. Hackers obtain your personal and financial data from your online shopping habits to hack into your bank account and steal funds. Alot of the time, the amounts are very small, 50 cents, or a couple of dollars but when theyre doing it to millions of unsuspecting victims, it adds up. My husband has had this happen to him a few times unfortunately. It helps to have a good bank that has good fraud detection services. Usually within a day or so, the bank should call you to go over your expenses to verify these odd transactions. If you cannot confirm that you made these purchases, they will shut down your cards and issue new ones. Having to delete your old cards from online shopping sites and bill pay is a hassle but thank goodness for the banks IT department that catches these hackers before you loose everything.

3. Malware is basically an infection that gets access to your computer and all of its information via fraudulent software, an unprotected computer, infected USB and other devices, etc.In the early 2000's there was a music app called Limewire. Not only was it illegally letting people have music for free but it was also notorious for giving your computer viruses. Back then, we didn't have all the music downloading apps that we have now like, Apple music, Spotify, Napster, etc. This was when we were barely coming into downloading music. No one wanted to buy CD's anymore, downloading was much easier and on Limewire you could do it for free, but it came with huge risks. Malware risks to your computer, the choice was yours! Anti-virus software also became more popular during that time. A good anti-virus program will keep you safe from Malware but also, staying away from fraudulent activity and sketchy websites will also go a long way.

Reference no: EM133208110

Questions Cloud

How australian extreme climates will change : Use CSIRO climate change projections to predict how Australian extreme climates will change.
Identify risks associated with the provision of support : Alison is training Barbara to support Mr Williams. While they are walking up the drive to his house, Alison and Barbara talk about what they will be doing.
Do you believe columbus was either a hero or heretic : Columbus Hero or Heretic Essay - Listen to the following Fresh Air podcast and discuss, do you believe Columbus was either a hero or a heretic and why
Find an example of an article that may be biased : Find an example of an article that may be biased, and explain what indicated a bias. Include the title and link for the article.
Explain three ways that computer users can be victimized : Explain three ways that computer users can be victimized by computer security risks and computer crime. Explain each in detail
What could the documents tell a digital forensic examiner : ccjs 420 University of Maryland - University College. What could these documents tell a digital forensic examiner about you and your activities?
Identify the major hardware and software components : CIS 599 Strayer University. Identify the major hardware and software components of your hypothetical e-commerce company's information systems infrastructure.
Write an investigation report about the written skills : Write an investigation report about written and oral technical skills that used in a software developer position and identify problem that drives investigation
How should the him department be involved in the process : Choose three (3) or more of the IM standards and discuss how you would ensure compliance with your selected standards. Include steps for a process for each stan

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd