StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Security - Preventing Malware Attacks - Essay Example

Cite this document
Summary
The paper "Computer Security - Preventing Malware Attacks" states that the rate of production of malicious programs exceeds that of legitimate applications; and the most common malware transmission method is through email and the internet. The author gives advice on how to adopt preventive measures…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
Computer Security - Preventing Malware Attacks
Read Text Preview

Extract of sample "Computer Security - Preventing Malware Attacks"

Computer Security: Preventing Malware Attacks Computer Security: Preventing Malware Attacks Introduction Malware refer to maliciousware; and it involves software used in disrupting computer functions or operations, get sensitive computer information, and gain access in private computer networks. It appears in many forms, for example; software form, code, scripts and active content. Malware generally refers to types of hostile and intrusive software. Malware software include; viruses, spyware scareware, ransomware and other types of malicious computer programs. In the field of Law; malware is referred to as computer contaminant; this is indicated in the legislations of many states in USA. However, there are many cases where malware is found in genuine software like company software; and the malware can be used maliciously in gathering marketing data. Software like firewalls, antivirus and antimalware are installed in computers to prevent malware attacks. First cause of action in Malware Attack The school administrators and teachers, on detecting malware attacks on school computers, should take steps to adopt the damage and adopt ways of minimizing the malware attacks in future. Assessing the damage involves three steps; preparation, investigation and assessment. In preparation stage; the administrators should avoid using the browser of affected computers; this is because malware usually spreads through browser vulnerabilities and opening infected web page can damage the computer further. The investigation stage involves identification of the malware type; this can easily be done through the study of malware categories in the server configuration and SQL injection (Cashell & Webel, 2004). In assessment stage the administrators should consider the damage done, for example; data theft of computer files corruption. Public Information on Malware Attack The school administrators should inform members of the public on the malware attacks cases; through the appropriate communication or media channels. The public should also be informed of the type and magnitude of malware attack. Malware attack on school computers can be motivated by financial reasons, data theft or the innovative nature of students. The public must be told of the appropriate measures put in place to investigate the malware damage; and their trust can be achieved through explaining the measure adapted to prevent further attacks in future. Preventing Malware Attacks There are software programs which have been made for the main purpose of combating malware; the school administrators should ensure that this antimalware software is installed in all official computers. Other preventing measures involve; backup measures and recovery measures. Antimalware software minimize malware attacks in two main ways: They provide protection against the installation of malware programs in a computer. Antimalware programs work like antivirus programs; the software scans incoming data for available malwares, and then preventing or neutralizing the malware threat. The second protection measure involves; the antimalware program can have the capability of detecting and then removing malwares which are already installed in the computer. This antimalware software scans software found in; installed programs, operating systems, and windows registry; and thereafter it provides a list of threats found, allowing the computer user to delete files which have malware characteristics. Ethical Issues in Malware Attacks Students should be discouraged from installation of malware programs in school computers. The students must be taught the negative impact of the malwares in the data network of the school. One of the negative impact of the malware in a school set up is; loss of privacy. Certain malware programs are designed with the capability of creating a character log based on key strokes. This character log can reveal sensitive personal data like email address and email login password. Financial data can also be logged; and this can lead to unauthorized access to personal or school bank account. The second negative impact in school computers is that; malware can cause computer instability. The work of school administrators and teachers is thus negatively affected because the computer in use crushes, automatically reboots, fails to shut down or fails to start. Students and Malware The school administrators can apply different approaches in dealing with students participating in malware installation in school computers. The first approach is subjecting them to appropriate disciplinary process. This will enable them to understand the negative effects of the program that they installed; for example the loss of sensitive school records. The second approach involves encouraging students to improve their technological innovation skills. This is done through study of malwares in only selected school computers; most probably in the school computer laboratory. In the laboratory they should be allowed to install malware programs, notice the effects of the malware; and finally device a means of uninstalling the malware program so as to return the computer to normalcy. Conclusion The rate of production of malicious and unwanted programs exceeds that of legitimate applications; and the most common malware transmission method is through the internet email and internet’ World Wide Web. Therefore, the preventive and protection measures explained in this paper should be adopted. Computer Security: Preventing Theft / Loss of Computer Equipments Introduction Computer physical components can be stolen or lost; lose or theft of this computer hardware parts indicates computer security breach. The most common devices which are portable in nature and small in size, they include; flash drive, memory cards, external hard drives and micro or mnini computers like iPads, laptops, Personal Digital Assistant, notebooks and smart phones. There are many cases where people steal flash drives and memory cards contained job related information of school employees, or students’ academic records. There are also cases involving theft of laptops, iPads or Personal Digital Assistants of school administrators; which obviously contain sensitive school information. First cause of action during Theft / Loss of Computer Component When a computer part is stolen; the school administrators must immediately inform the school security or the state police; this is because theft of any property is a criminal offence which should be investigated and the suspected persons charged in court. Also, lose of school computer components should immediately be reported to school authorities; this will enable investigations to recover it. Theft of computer parts is a matter of great concern because schools usually store very sensitive data in computer; for example financial transaction records and student academic progress reports. Public Information on Computer Hardware Theft Members of the public should be informed on any lose or theft of computer components. This is because they are among the stakeholders of the school and their contribution in investigating the theft of loss of computer parts is highly welcomed. Members of the public participate in supplying materials used by the school community, and therefore theft of maybe a laptop containing supplier data must be of great concern to them. Also, some members of the public are parents and guardians of students in school; computer component theft can lead to lose of records on students’ academic progress and fee balance records. The trust of the public on data security must be maintained through; explaining appropriate data backup method employed by the school in case of theft of computer component (Cashell & Webel, 2004). Preventing Lose / Theft of Computer Equipments The school administrators can install tracking devices on the mini or micro computers and other computer components. The tracking devices or programs should have the capabilities of remotely accessing a computer using the wireless internet connection and IP address; and maybe even take pictures of current user. If a computer is reported as missing; then the tracking system should be activated and the received information will be used to recover the stolen computer. The other methods used to prevent hardware theft involve storing computers in a safe room with either human security or automatic security which uses unique characteristics to ensure access. The computers should also be password protected to ensure prevention of data theft. Ethical Issues in Computer Theft / Lose The school community should be informed of the importance of ensuring safety of computer and their components. This is because the school used a lot of money in acquiring the electronic equipments. Theft of lose of computers due to negligence should not be tolerated by school administrators; and the affected individual must compensate for loss of school property. The school administrators should also start a campaign sensitizing the students to desist from the negative theft behavior; as it can result in police arrest and court prosecution. The student should also be encouraged to report on any lost or stolen computer or computer devices; and assist in recovery investigations. Student Involvement in Computer Lose / Theft Any student proved to participate in theft of computer or computer parts must be subjected to disciplinary action. This will involve a counseling session where the student is made to realize the negative effects of his or her actions; the parents or guardian of the said student should also be involved in the counseling session. The remedy for this case will be to either return the stolen equipment or offer monetary compensation. Students who lost school computers due to negligence will also be required to offer monetary compensation or buy a new computer for the school. Conclusion The school administrators should put in place adequate measures of preventing the loss or theft of school computers. This is because they are responsible for ensuring the safety of any school property. Computer should be kept in a secure room with only authorized access; and staff s and students should be very keen on their portable computers or computer components. References Cashell, B. & B. Webel (2004) The Economic Impact of Cyber-Attacks. Congressional Research Service, Government and Finance Division, Washington DC: The Library of Congress. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Report Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Security Report Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1644534-security-report
(Security Report Essay Example | Topics and Well Written Essays - 1500 Words)
Security Report Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1644534-security-report.
“Security Report Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1644534-security-report.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Security - Preventing Malware Attacks

Remote Access Computer Trojan

These attacks were then expanded to 38 Chinese organizations by 2008 [Mat11].... Furthermore, the author tells about different anti-malware.... This research "Remote Access computer Trojan" analyzes how rapid developments in science and technology have actually enabled the cybercriminals to design computer software and viruses which can significantly harm any computer.... hellip; Remote Access computer Trojan (RAT) enables the hackers and cybercriminals to do almost anything on the victim's computer....
4 Pages (1000 words) Research Paper

Javascript Sanboxing

ontrary to the immense benefits the system offers, the application is also at risk of attacks by malwares since it is not secure in all angles.... Any malware cannot execute on a system without authorized permissions.... preventing Capability Leaks in Secure JavaScript Subsets Network Network Web Page.... JavaScript Sandbox Affiliation JavaScript Sandbox A JavaScript sandbox is an advanced system of enhancing security in the programming language....
1 Pages (250 words) Essay

Modern Day Attacks against Firewalls and VPNs

This essay "Modern Day attacks against Firewalls and VPNs" intends to explain and discuss modern-day attacks against firewalls and VPNs.... nbsp;This essay intends to explain the modern-day attacks against firewalls and VPNs by explaining the concepts of these two information technology tools.... The common threats pertaining to firewalls include attacks from malicious codes such as viruses, worms, and information theft among others (Rao et al....
8 Pages (2000 words) Essay

Mac VS Windows Security

In addition, the following steps can help mitigate this weakness: “Enable (and require) NTLMv2 authentication -- this will prevent pre-computed attacks, because the client provides part of the randomness.... Enable (and require) message signing for both clients and servers -- this will prevent relay attacks.... Install ms08-068 -- this will prevent a specific subset of relay attacks, where its relayed back to itself.... his measure is meant to enhance Windows credential protection against attacks such as Pass-the-Hash and Pass-the-Ticket....
2 Pages (500 words) Essay

Preventing and Removal of Ransomware

The paper "Preventing and Removal of Ransomware" asserts that Any user should back up their files as a precaution not to lose the important files in case of any attacks.... The attacks using ransomware are becoming more sophisticated and refined in algorithm posing great challenges to data protection.... hellip; In the computer virology, there are numerous scientific researchers investigating other malware programs such as Trojan, spyware, and worms....
6 Pages (1500 words) Essay

Role of Network Security: How Does It Protect You

This feature plays a very helpful and efficient role in preventing unauthorized access to the data.... From the paper "Role of Network security: How Does It Protect You" it is clear that network security is a very challenging and difficult task.... hellip; Every organization needs its own proper security system in order to maintain the reputation of their company.... nbsp; Since security is absolutely a difficult topic, and everyone has their own ideas and approaches to it....
6 Pages (1500 words) Essay

The Idea of Sandboxing and Its Techniques

This coursework "The Idea of Sandboxing and Its Techniques" focuses on the main function of the sandbox that generates a remote atmosphere in which the applications run to block malware attacks.... The applications that are run by sandbox include IM consumers, Web browsers, Online games, Emails, and other applications that are open for malware attacks.... The applications that are mishandled by the vendors cannot be protected from malware by the sandbox....
14 Pages (3500 words) Coursework

Web Application Security

The paper critically discusses the dangers of SQL injection in terms of website attacks that affects most individuals and organizations.... The incorrectly filtered escape characters are some of the methods that render the websites of the organizations vulnerable to attacks.... … The paper "Web Application security' is a perfect example of a term paper on information technology.... The paper "Web Application security' is a perfect example of a term paper on information technology....
6 Pages (1500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us