Retrieved from https://studentshare.org/information-technology/1604386-cybersecurity
https://studentshare.org/information-technology/1604386-cybersecurity.
Business managers appreciate cyberspace as a provider of a faster medium for communication in organizations. On the other hand, cyber security plays a critical role in ensuring that the organization’s systems and data remain safe against any malicious intent.
Software programs, particularly those that run, store, and retrieve data from databases remain vulnerable to cyber attacks. Aksoy and DeNardis (2008) define viruses as malicious codes which would be embedded in legitimate programs and get activated with the execution of the program. The authors further note that viruses would propagate from one computer to another. A Trojan horse refers to a virus dissembled in a legitimate program. For example, the Melissa virus known to have been spreading through the internet and which disabled networks was spread when a user opened an infected attachment which caused the virus to be emailed to 50 recipients in the user’s address book which created an exponential increase in the virus-infected messages. Erdbrink (2012) reports how countries such as Iran have spent massive resources on controlling and preventing viruses. Anti-virus programs combat these viruses and keep the system and network safe from virus attacks.
Read More