Network Security

Several threats have been identified against computers and the information technology field as a whole. While many threats and cyber-threats to systems and information, whether open-source, protected, or even proprietary, were here long before the invention of the computer, they have increased significantly over the last decade or so due to the various technological improvements and implementations. In fact, the amplification of threats among systems and information has grown so drastically that it has become somewhat of a foundation of security for the entire country.  According to Onyshchenko et al. (2024), “the growth of cyber-attacks on critical infrastructure objects in recent years has made the information environment protecting issue as a basis for ensuring the countries national security as a whole” (p. 819, para. 1). This is significant and highlights the impact and influence of these implemented measures. In the coming paragraphs, I will explain why computers are vulnerable to viruses and phishing, share the risks that each threat imposes, and suggest two recommendations that protect computers from these dangers. 

Viruses and phishing are both common threats among cyber threats. Viruses aim to destroy data and software. According to TestOut Corp. (2024), “some viruses can deploy ransomware, which lock up a computer and demand money to release it” (Section 4.2.4, para. 4). Viruses can damage a computer in several ways, making it continually freeze, crash, or run much slower than usual. They can delete important files and permit access to individuals who wish to inflict harm. They can even go as far as to shut down a computer altogether. 

While some viruses can inflict detrimental damage, others can be much less complex and can be repaired with anti-virus software. Some symptoms that can occur when a smaller, less invasive virus attacks a computer are unwanted and constant pop-ups, a glitching screen, and random crashes or data loss. Viruses are not the only kind of attack that hackers impose on trusting victims. Sometimes hackers will send different attacks called phishing, which are typically sent to several people.

Phishing is when hackers send out a mass message to several, sometimes tens of thousands of unsuspecting victims, in hopes of getting some of them to open clickable links so assets can be stolen. According to Grensing-Pophal (2023), “phishing attacks are a form of ‘social-engineering’—hacking computer systems, not through technology, but through the vulnerabilities of employees” (para. 6). Phishing attacks open computers up to countless threats and risks. A hacker can steal important documents from a multi-million dollar company, or even worse, funds. This is more likely to result from an attack called spear phishing, which is when a specific person is targeted and sent a compromising email, as opposed to several victims. Another similar threat is smishing. This is when a hacker sends a text message to attempt to attack a victim. Common smishing attacks include account verification, tech support, and bank fraud scams, as well as scams promising prizes.

Cyber threats, including malicious content called malware, ransomware, viruses (which are considered the worst form of malware), phishing or smishing, and pharming, are all among the most prevalent threats to computers. The good thing is, just as we have several things that can harm computers, we also have many ways to avoid, mitigate, or repair damage inflicted by cyber attacks. Protecting computers and digital or physical information from threats can be as simple as using passwords to lock computers or drawers and lock safes to protect confidential information. 

It can also be as complex as biometric authentication, like using fingerprint or facial recognition, or multi-factor or two-factor authentication, which combines different protective measures to increase the difficulty and further mitigate risks. These types of security measures, along with single-sign-on (SSO), can help prevent phishing, while hardware locks, which attach to computers and prevent unauthorized usage, and anti-virus software are excellent ways to prevent and combat viruses.

It is important to keep in mind that cyber threats come in several different forms and to be wary of any communication that looks off, especially if you are asked to click a link or provide personal or confidential information. Throughout this paper, I shared how computers are vulnerable to viruses and phishing, presented risks associated with each threat, and provided suggestions to protect computers from them. Purchasing anti-virus software, routinely changing passwords, and learning more about the many threats and proven ways to combat them are actions that one can take to protect computers from cyber threats.

References

Grensing-Pophal, L. (2023, February 7). Phishing Attacks: What You Need to Know. Society for Human Resource Management. https://www.shrm.org/topics-tools/news/technology/phishing-attacks-need-to-know

Onyshchenko, S., Yanko, A., Hlushko, A., Maslii, O., & Cherviak, A. (2023). Cybersecurity and Improvement of the Information Security System. Journal of the Balkan Tribological Association, 29(5), 818–835

TestOut Corp. (2024). CertMaster Learn Tech+. http://www.testout.com

Comments