HDC215-0411-2022 Edna Awuor Otieno Assignment
docx
keyboard_arrow_up
School
University of Nairobi *
*We aren’t endorsed by this school
Course
112
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
6
Uploaded by SargentTurtleMaster3709
1
Edna Awuor Otieno
HDC215-0411/2022
JOMO KENYATTA UNIVERSITY OF AGRICULTURE AND TECHNOLOGY
BIS 2207
Conservation and Preservation of Information Resources
Assignment 1
2
In the realm of information security, the perils of Malvertising and Ransomware
loom large. This work explores preventive measures against these digital threats, emphasizing technological defenses, user education, and physical security. A comprehensive approach is outlined to fortify information materials, ensuring resilience in the face of evolving cybersecurity challenges.
Malvertising:
Overview
Malvertising, short for malicious advertising, involves the spread of malware through online advertisements (Rosencrance, 2023b). Attackers use online ads to inject malicious code into users' devices, leading to various security threats.
Dangers:
Malware Distribution: Malvertising can distribute various types of malware, such as viruses, trojans, or ransomware, to compromise the security of information materials.
Phishing Attacks: Malvertisements may redirect users to fake websites, leading to phishing attacks that attempt to steal sensitive information.
Preventive Solutions:
Ad Blockers:
Users can install ad blockers to prevent the display of potentially malicious
advertisements.
3
Regular Updates:
Keep web browsers, plugins, and operating systems up to date to patch vulnerabilities that could be exploited by malvertisements.
Employee Training:
Educate employees on recognizing and avoiding malicious ads, emphasizing the importance of not clicking on suspicious links.
2. Ransomware:
Overview
Ransomware is a type of malicious software that encrypts files on a victim's system and demands a ransom for their release (Rosencrance, 2023b). It poses a severe threat to information materials as it can lead to data loss or unauthorized access.
Dangers:
Data Encryption: Ransomware encrypts files, making them inaccessible to the user until a
ransom is paid.
Data Exfiltration: Some ransomware variants can steal sensitive information before encryption, leading to potential data breaches.
Preventive Solutions:
Regular Backups:
Regularly back up critical information materials, and store backups in
a secure, isolated environment. This allows for the recovery of data without paying the ransom.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Security Software:
Install and regularly update reputable antivirus and anti-malware software to detect and prevent ransomware infections.
User Training:
Educate users about the dangers of phishing emails, which are a common
vector for ransomware. Teach them to avoid clicking on suspicious links or downloading attachments from unknown sources.
Network Segmentation:
Segmenting networks can limit the spread of ransomware by restricting its ability to move laterally within a network.
Physical, Chemical, and Biological Threats:
While physical, chemical, and biological threats are not directly associated with malvertising and ransomware, they pose risks to the physical storage media of information materials. Here are some preventive measures:
Physical Threats:
Secure Storage:
Store physical storage media (e.g., hard drives, servers) in secure locations to prevent theft or physical damage (Hypertec Solutions Partner, 2022).
Fire Suppression Systems:
Implement fire suppression systems in data storage facilities to protect against fire-related damage.
Chemical Threats:
5
Environment Monitoring:
Regularly monitor environmental conditions, such as temperature and humidity, to prevent chemical damage to information materials.
Storage in Controlled Environments:
Store physical media in controlled environments to minimize exposure to corrosive chemicals.
Biological Threats:
Access Controls:
Implement strict access controls to data storage facilities to prevent unauthorized access by individuals who may pose a biological threat.
Regular Cleaning and Maintenance:
Regularly clean and maintain storage areas to prevent the growth of biological contaminants (Hypertec Solutions Partner, 2022).
In summary, a multi-faceted approach involving technological solutions, user education,
and physical security measures is crucial for safeguarding information materials from malvertising and ransomware as well as physical, chemical, and biological threats. Regularly updating and adapting these preventive measures is essential in the ever-evolving landscape of cybersecurity and information management.
6
References:
Hypertec Solutions Partner. (2022, November 23). Data Storage Security - How secure is your data? | Hypertec SP
. Hypertec SP. https://hypertecsp.com/knowledge-base/data-
storage-security/
. Rosencrance, L. (2023b, February 7). Top 10 types of information security threats for IT teams
.
Security. https://www.techtarget.com/searchsecurity/feature/Top-10-types-of-
information-security-threats-for-IT-teams
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help