Site Loader

The Possible ways of how our personal computer system
could be compromised.

 

1)      Malicious
software could be compromised our personal computer.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Ø  Malicious
software is virus, worm, Trojan horse, key logger, network sniffer, and dialer.

2)      Infrastructure
or service problems could be compromised our personal computer.

Ø  It
may be failure of Software, Hardware.

Ø  It
may be failure of  electricity which is
power outage or power surge

Ø  It
may be failure of network which is cable cut or saturation.

Ø  It
may be failure of Air-conditioning, System upgrades, and Service providers.

Ø  It
may overload of CPU, memory, storage, and network.

3)      Human
errors could be compromised our personal computer.

Ø  Human
keep weak security.

·        
It may be loss of laptops, smartphones,
and USB-sticks.

·        
It may be no encryption, and password
leaks of cracks.

·        
It may be computer console left unlocked.

Ø  Human
are misunderstanding computer interface or other mistakes.

·        
It may be deleting data and corrupting
data.

Ø  Confiscation
of machines could be compromised our personal computer.

4)      Downloading
free software could be compromised our personal computer system.

When user download a free
software sometime it will introduce malware, viruses or buggy   software.

5)      The
personal computer system could be compromised by without install operating
system updates.

Any computer user is to always install security
updates, when they become available for your operating system. Bugs are
unfortunately created when operating systems are developed that could cause
security.

6)     
The personal computer system could be
compromised by haven’t installed applications up-to-date

The personal computer as secure as possible, user need
to make sure these programs are updated when new security fixes are released.
The problem is that many people just ignore alerts about new updates, even
though these updates fix security problems that could allow hackers into your
computer.

7)     
The personal computer
system could be compromised by without
Install ,update, and use anti-virus software

The computer has antivirus software
running on machine. By having an antivirus program running, files and emails
will be scanned as use them, download them, or open them. If a virus is found
in one of the items people are about to use, the antivirus     program will stop you from being able to run
that program and infect yourself.

 

8)     
The personal computer
system could be compromised by having poor password.

 

9)     
The personal computer system could be
compromised by haven’t up to date windows.          

Hackers often
discover new ways to bypass Windows’ built-in security features configured.

 

10)  The personal computer system could be
compromised by don’t turn on the windows
firewall.

Windows has a built-in ‘firewall’ that protects your PC from unwanted
attention via the internet.

 

11)   The
personal computer system could be compromised by don’t use the latest version of the web    browser.

Web browsers are vital applications, but just like other software, they
can contain bugs. Once a web browser has been compromised in this way, a hacker
can monitor everything you type, including passwords to credit card numbers.
That’s why it’s vital to use the latest version of your web browser -anything
other than this may be a security risk.

 

12)   The
personal computer system could be compromised by falling for phishing emails.

 

13) 
 The personal computer system
could be compromised by don’t use the windows
malicious software removal tool.

14) 
The personal computer system could be compromised by attachments from people you don’t know.

 

 

 

 

The possible attack vectors.

 

Ø  Denial
of Service Attack

Ø  Keystroke
loggers

Ø  Malware

Ø  Phishing

Ø  SQL
Injection Attack

Ø  Cross-Site
Scripting (XSS)

Ø  Session
Hijacking Attack

Ø  Man-in-the-middle
Attack

Ø  Credential
Reuse

Ø  Chat
Rooms

Ø  E-mail
attachments

Ø  Pop-up
windows

Ø  Instant
messages

Ø  Web
Pages

 

 

 

 

 

 

 

 

 

 

Task 02

 

The possible risks that can have an impact on the
security and stability of your data and internal and external information and
technology services.

 

Ø  We
can have an impact on the security by capture every username and password typed
on the keyboard by install key logger. Then a hacker can use your computer to
log into your accounts, and carry out institution related data and internal and
external information.

 

Ø  We
can have an impact on the security and stability of our data and internal and
external information by send malicious emails to all the contacts in your email
folders in order to spread viruses, malware, and spyware.

 

Ø  If
the device or software failures, we can have an impact on our technology
services.

 

Ø  We
can have impact on our technology services by the environmental issues.

(Environmental issues
like heat, cold, humidity, static, and electricity)

 

Ø  Development
of loss databases can have an impact on our technology services.

 

Ø  Denial
of Service (DOS) attack can have an impact on our technology services.

 

Ø  If
Share the confidential data and information of the institution with others by
trust them, It may be use that valuable data by others in different dangerous
purpose.

 

Ø  Carelessness
can have impact on the security and stability of your data and internal and
external information and technology services.

It means when the
equipment or service will be failure, we request to get help from other
knowledgeable people who are related in that equipment or service. The person
who are support to another institution or sell our institution’s confidential
data and information to other institution’s owners.

 

 

 

Recommendations to lower the risks.

 

Ø  Encryption
can reduce the stealing password by the hackers.

Encrypting data as it is
stored and transmitted.

 

Ø  Implementing
strict access control mechanisms and data classification will be reduce the
stealing password files by the hackers.

 

Ø  Maintaining
backups to replace the failed data, information, and service will be reduce an
impact on our technology services become from the device or software failures.

 

Ø  We
can reduce the risk of confidentiality related by training personnel on proper
procedures will be reduce the risk.

 

Ø  We
can reduce the risk of integrity related by use Strict Access Control,
Intrusion Detection and Hashing.

 

Ø  We
can reduce the Denial of Service attack risk by use of certain firewall and
router configurations.

 

Ø  Web
browsing will be keep our personal data.

 

Ø  Cloud
Services will be keep our personal data.

 

Ø  File
storage and archiving will be keep our personal data.

 

Ø  Social
networking will be keep our personal data.

 

Ø  Wireless
services will be keep our personal data.

 

Ø  Personal
Security will be keep our personal data.

 

Ø  Search
Engines will be keep our personal data.

Post Author: admin

x

Hi!
I'm Rhonda!

Would you like to get a custom essay? How about receiving a customized one?

Check it out