Friday, July 26, 2019

Questions Essay Example | Topics and Well Written Essays - 250 words - 11

Questions - Essay Example It has been reported that GhostNet worked on behalf of the Chinese government. This group causes the target computers to download the malicious software and gives control of computers to attackers. The US department of Defence has been attacked so many times by this group (Lord & Sharp, 2011). Cyber attackers target the important official websites for breaching the important data. Threats of computer security are inventive, which are used to harm the individual as well as business computer systems. For example, the computer network of the White House was breached by hackers on October 2012. They used the spear phishing attack. Another incident occurred when federal IT staff of Canada was fooled by hackers as giving them access to computers of government offices. In this way, the hackers got the access of the government systems (Websene, 2012). Both, individuals and businesses can install the perimeters firewalls, which permit only the authorized users to access the network. The network can be protected from the attack â€Å"Denial of service â€Å"by using the perimeter firewalls. An individual or business network administrator should configure the email servers to remove or block the attachment of emails, which are used to spread the viruses, and other, many attacks. Individuals and businesses must keep the backups of their important data (Symantec Corporation, 2011). It is concluded that the information security is important from both inside and outside attackers. Similarly, the data security from blended attacks must be ensured for both individuals and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.