Assignment 2

docx

School

American Public University *

*We aren’t endorsed by this school

Course

ISSC452

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by AmbassadorHummingbirdPerson531

Report
1 ABC Consulting Group Presentation Kyle Namen American Public University Cybersecurity ISSC452 Dr. Ron L. Booth 11/18/2023 Hello everyone, my name is Kyle. It is my pleasure to speak with all of you about threats to information security. By a show of hands, how here owns or operates a computer, mobile
2 phone, or game console? Just about, if not everyone, just put their hands up. All of those devices store or access information that you want to remain private like your banking information, usernames and passwords, and more. If those systems are not protected, others may be able to access your information or destroy your systems. Today, I will be explaining a few ways that someone may use to gain access to a system. Malware : Malware is a type of software that is designed to harm or exploit any device or network. It can be in the form of viruses, worms, trojans, or spyware. Malware can steal sensitive information, damage files, or even take control of the device (Brazos, 2020). Viruses are programs that make their way into a system through hardware or software and hide themselves within another file. Then they begin to replicate and proceed to damage whatever it was programmed to (Brazos, 2020). Worms are similar to viruses in that they will replicate themselves, but they do not need to attach to a preexisting file on the device. Then, the worm typically causes the machine to slow severely by increasing the amount of bandwidth, or brain power that the device is using. They can also serve to allow someone else access to the device remotely (Brazos, 2020). Trojans can be designed for damaging effects or to create the same backdoor access that a worm can produce. Trojans are usually installed by the user but are disguised as something else. Once installed it will unknowingly start its intended function (Brazos, 2020). Spyware is a program that when downloaded will take over control of some functions or collect data and send it to the creator. It does not always do damage but will spy on your activities and report them back to someone who is ready to steal your information (Brazos, 2020).
3 Phishing : Phishing is a type of cyber-attack that involves tricking people into giving away their sensitive information such as passwords, credit card numbers, or bank account details. Phishing attacks can be carried out through emails, text messages, or phone calls, and are often disguised as legitimate communication from a trustworthy source (FTC, 2018). Insider Threats : Insider threats may be something only your employer is concerned about unless you have a particularly disgruntled individual at home who uses your computer. These are security risks that come from within an organization. They can be caused by employees, contractors, or partners who have access to sensitive information. Insider threats can be intentional or unintentional and they can steal, delete, or corrupt the information or compromise the system. I have just covered a few ways that information security is vulnerable but with the proper security software and a little bit of safeguarding on your part can go a long way. The software will detect and prevent unauthorized things from being installed or operating on your device. As for you, you can just sound judgment when clicking links in emails, providing information over the phone, or not downloading the pirated version of Taylor Swift's newest album. References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Brazos Communications . (2020). Instructions/Guides/Media . Retrieved November 15, 2023, from https://www.brazosnet.com/instructions-guides-media/ Federal Trade Commission. (2018, October 31).  Phishing Scams . Federal Trade Commission. https://www.ftc.gov/news-events/topics/identity-theft/phishing-scams