You are on page 1of 3

Ashley Grantham

Sept 17, 2014


csit assignment 1


1

I want to show you some things you might not know about your security
and how the viruses and programs work and how you might be able to fix
your problems. This website showed me how easy it is to mess up one
persons account and have It be a massive worldwide problem. Saying its
easy wouldnt necessarily be correct its more along the lines of the person
messing up and not being able to fix his problem in time for others to find it
with ease. This is not always the case though.
datahttp://www.nytimes.com/2014/08/15/us/politics/report-says-irs-
inaction-may-have-increased-fraud-risk.html?_r=0
A true but not recognized thing about internet is that the internet is
not a wildly safe place for security. At one point in time there were almost
80% of security breaches in just the company businesses. Most common
problems on the computer is the viruses and damaging programs you dont
even know you are putting on your computer. Viruses spread quickly and
operate subtly and rewrite the coding on your computer, and by the time you
notice the damage has been done. Read more:
http://www.referenceforbusiness.com/small/Inc-Mail/Internet-
Security.html#ixzz3Dhkogyrf
A way to avoid security damage and viruses is to install an anti virus system.
While the anti-virus is there to protect and detect infestation with
malicious software you also need a firewall to regulate the network
communications the computer receives permitting or denying such
Ashley Grantham
Sept 17, 2014
csit assignment 1


2

communications based on how trusting the source. Another thing called user
vigilance or in short just plain common sense is one of the most effective
defenses against potential Internet-related security vulnerabilities. Last
updated 13th September 2012
http://explainingcomputers.com/security.html
The difference between these two articles is that one tells you what
some of the problems that happen are your own fault and some ways you may
want to look out for these problems but things aren't always as easy as it
seems. The second article explains what your options are and gives a step by
step process of how you can acquire these. The excerpt I pulled from the
article above these was to just show people how much they really dont know.
Now I am going to show two more articles that show into even more in depth
your are open to viruses and intruders being able to see your personal
information.
A journal written by Susan Mclean called Beware the Botnets: Cyber
Security Is a Board Level Issue written in December of 2013 states that
cyber attacks have many different ways including, spamming, spoofing,
malware and Id theft. These so called cyber attacks can result in
infrastructure, downtime and business interruption the European Network
and Information Security, but the Agency (ENISA) was formally granted a
seven-year mandate with an expanded set of duties, then in July 2013 the
Cybercrime Directive was officially adopted. The Cybercrime Directive aims
at the increasingly sophisticated and large-scale forms of attacks on
Ashley Grantham
Sept 17, 2014
csit assignment 1


3

information systems that have emerged since the Framework Decision. its
also intended to enlarge the scope of criminal offenses, increase the level of
sanctions and provide a reinforced framework for cooperation between the
relevant EU agencies and bodies (such as Euro just, Europol, the European
Cybercrime Centre, and ENISA).
My next journal used was actually a survey done by the Budapest
university of technology and economics. This journal is about the security of
hardware virtualization. Virtualization is a powerful technology for
increasing the efficiency of computing services. Virtualization provides an
abstraction of physical hardware that allows for the operation of the same
services on a multitude of different physical hardware platforms. By
controlling access to the physical resources. it can also be used to run
different services in parallel on the same physical hardware. Be aware of
the fact that it gives rise to a number of security issues. Some of those
issues exist in traditional computing environments as well. One example is
the multitenancy, which allows for cross-platform information to flow
through hiring virtual machines over the same physical host.
My conclusion to these articles is that even though you know the
causes and know that thy exist you cant always know for sure that it is
happening and need to be prepared for when it happens. From the people
who have done the research 'you need to be aware and be prepared.'

You might also like