Answer to Question #203916 in Management for Meseret Refera

Question #203916

Even if IT is giving a lot for the business world, it has also posed a very serious IS security threat.

a.      List at least three factors or computer crimes contributing to information security threats.

Computer crime is also called cybercrime,

b.     Discuss three of the mechanisms that address information security challenges.


1
Expert's answer
2021-06-07T17:10:03-0400

a.            List at least three factors or computer crimes contributing to information security threats.

1)     Malware. Malware is malicious software such as spyware, ransomware, viruses and worms. 2) Phishing 3) SQL Injection 4) Password Attacks

b.           Discuss three of the mechanisms that address information security challenges.

Information security challenges can be solved in various ways by carrying out cyber security training. Computer and smartphone users should implement a combination of security measures, using both technology-based and training-based methods. Firstly, use Anti-Virus Software because many computer users simply don’t install it or neglect to update the software they do have. Start by installing reputable, effective anti-virus software on each laptop and desktop computer.

Secondly, use firewalls. Set up a firewall in your home or business in order to protect your network and computers from outside attackers. These devices can come in either hardware or software formats, and both can be quite effective in filtering out unnecessary traffic. Firewalls in hardware form can be placed between your computer and your modem in order to prevent malicious code or viruses from getting through. Firewalls in software format can be installed on nearly any operating system and can also effectively block cybersecurity risks from attacking your computer or network.

Thirdly, avoid using public Wi-Fi or if you have to use then it is best to use a VPN to protect yourself. The security of the Wi-Fi at these public places can be shoddy. A VPN helps secure your internet connection so that data traveling in/out of your computer is encrypted.

Lastly, ensure that you use two-factor authentications because users simply enter a username and password in order to access an account or information online. Two-factor authentication effectively doubles the security you have in place when you log in to an online account. Instead of the basic username and password combination, this secure format requires additional information that theoretically only the user knows or has access to.


Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

No comments. Be the first!

Leave a comment

LATEST TUTORIALS
New on Blog