Friday, June 14, 2019

CyberSecuirty Threats Essay Example | Topics and Well Written Essays - 500 words

CyberSecuirty Threats - Essay ExampleThis compromise may include a covert computer terminal is connected to the same line through the telephone switching equipment and is then used when the legitimate drug user is not utilise the terminal. The computer cannot differentiate between the two terminals it senses only one terminal and one authorized user (Peter & Allan, 20).A user may also improperly sign off when leaving a terminal session. Here, the intruder will find the terminal session in active state and access the users files as the computer believes the user is still active. The perpetrator may also use another form of piggybacking where they forward the call of the victims calls to the perpetrators phone (Peter & Allan, 120).Passwords ar the other form of security verification methods implemented in computer networks and devices. With passwords, the user is required to enter enigma digits or letters or both to provide access to a system or files in a system (Lynch, 401). Passw ords have been in founding since long ago and are applicable in many fields such as in automated teller machines, mobile phones and computer run systems (Peter & Allan, 70). However, passwords have been known to be cracked and as such very in strength where alphanumeric patterns of passwords offer the strongest passwords while simple letters or digits offer weak and vulnerable passwords (Peter & Allan, 80).Phishing in internet security is a form of crime that occurs in the internet. Here, deception is used to acquire someones or a companys sensitive information such as their bank account details, credit card number, usernames and passwords. The culprit masquerades as a trustworthy party such as a bank or popular site (Lynch, 410). They in turn send emails or instant messages that are infected with malware and harm the unsuspecting victim. Once the message or email is opened the malware retrieves the users

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.