Thursday, May 2, 2019

CyberSecuirty Threats Essay Example | Topics and Well Written Essays - 500 words

CyberSecuirty Threats - Essay ExampleThis compromise may include a covert computer last-place is connected to the same line through the telephone switching equipment and is then apply when the legitimate substance abuser is not using the terminal. The computer cannot differentiate between the two terminals it senses only one terminal and one authorized user (Peter & Allan, 20).A user may also improperly sign strike when leaving a terminal session. Here, the intruder will find the terminal session in lively state and access the users files as the computer believes the user is still active. The perpetrator may also use another form of piggybacking where they forward the call of the victims calls to the perpetrators phone (Peter & Allan, 120).Passwords are the other form of security verification methods implemented in computer networks and devices. With passwords, the user is required to enter secret digits or letters or both to provide access to a system or files in a system (Ly nch, 401). Passwords have been in existence since long past and are applicable in many fields such as in automated bank clerk machines, mobile phones and computer operating systems (Peter & Allan, 70). However, passwords have been known to be cracked and as such real in strength where alphanumeric patterns of passwords offer the strongest passwords while simple letters or digits offer lite and vulnerable passwords (Peter & Allan, 80).Phishing in internet security is a form of crime that occurs in the internet. Here, deception is used to acquire someones or a companys sensitive information such as their bank account details, credit card number, usernames and passwords. The culprit masquerades as a trustworthy ships company such as a bank or popular site (Lynch, 410). They in turn tear telecommunicates or instant messages that are infected with malware and harm the unsuspecting victim. Once the message or email is opened the malware retrieves the users

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.