I want to show you some things you might not know about your security and how the viruses and programs work and how you might be able to fix your problems. This website showed me how easy it is to mess up one persons account and have It be a massive worldwide problem. Saying its easy wouldnt necessarily be correct its more along the lines of the person messing up and not being able to fix his problem in time for others to find it with ease. This is not always the case though. datahttp://www.nytimes.com/2014/08/15/us/politics/report-says-irs- inaction-may-have-increased-fraud-risk.html?_r=0 A true but not recognized thing about internet is that the internet is not a wildly safe place for security. At one point in time there were almost 80% of security breaches in just the company businesses. Most common problems on the computer is the viruses and damaging programs you dont even know you are putting on your computer. Viruses spread quickly and operate subtly and rewrite the coding on your computer, and by the time you notice the damage has been done. Read more: http://www.referenceforbusiness.com/small/Inc-Mail/Internet- Security.html#ixzz3Dhkogyrf A way to avoid security damage and viruses is to install an anti virus system. While the anti-virus is there to protect and detect infestation with malicious software you also need a firewall to regulate the network communications the computer receives permitting or denying such Ashley Grantham Sept 17, 2014 csit assignment 1
2
communications based on how trusting the source. Another thing called user vigilance or in short just plain common sense is one of the most effective defenses against potential Internet-related security vulnerabilities. Last updated 13th September 2012 http://explainingcomputers.com/security.html The difference between these two articles is that one tells you what some of the problems that happen are your own fault and some ways you may want to look out for these problems but things aren't always as easy as it seems. The second article explains what your options are and gives a step by step process of how you can acquire these. The excerpt I pulled from the article above these was to just show people how much they really dont know. Now I am going to show two more articles that show into even more in depth your are open to viruses and intruders being able to see your personal information. A journal written by Susan Mclean called Beware the Botnets: Cyber Security Is a Board Level Issue written in December of 2013 states that cyber attacks have many different ways including, spamming, spoofing, malware and Id theft. These so called cyber attacks can result in infrastructure, downtime and business interruption the European Network and Information Security, but the Agency (ENISA) was formally granted a seven-year mandate with an expanded set of duties, then in July 2013 the Cybercrime Directive was officially adopted. The Cybercrime Directive aims at the increasingly sophisticated and large-scale forms of attacks on Ashley Grantham Sept 17, 2014 csit assignment 1
3
information systems that have emerged since the Framework Decision. its also intended to enlarge the scope of criminal offenses, increase the level of sanctions and provide a reinforced framework for cooperation between the relevant EU agencies and bodies (such as Euro just, Europol, the European Cybercrime Centre, and ENISA). My next journal used was actually a survey done by the Budapest university of technology and economics. This journal is about the security of hardware virtualization. Virtualization is a powerful technology for increasing the efficiency of computing services. Virtualization provides an abstraction of physical hardware that allows for the operation of the same services on a multitude of different physical hardware platforms. By controlling access to the physical resources. it can also be used to run different services in parallel on the same physical hardware. Be aware of the fact that it gives rise to a number of security issues. Some of those issues exist in traditional computing environments as well. One example is the multitenancy, which allows for cross-platform information to flow through hiring virtual machines over the same physical host. My conclusion to these articles is that even though you know the causes and know that thy exist you cant always know for sure that it is happening and need to be prepared for when it happens. From the people who have done the research 'you need to be aware and be prepared.'