StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Potential security threats on a home personal computer - Essay Example

Cite this document
Summary
Introduction Personal computers as with those owned by organizations are at a great risk of experiencing computer crimes, as long as they are connected to a network. This is due to the fact that such connections allows and makes it possible for other people to access information in the computer from remote locations, with or without the user’s permission (Gollmann, 2005)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Potential security threats on a home personal computer
Read Text Preview

Extract of sample "Potential security threats on a home personal computer"

Introduction Personal computers as with those owned by organizations are at a great risk of experiencing computer crimes, as long as they are connected to a network. This is due to the fact that such connections allows and makes it possible for other people to access information in the computer from remote locations, with or without the user’s permission (Gollmann, 2005). This paper will discuss the various potential threats to such computers as well as how criminals succeed in effecting them.

Potential Security Threats on a Home Personal Computer Personal computers have continued to gain popularity in most of our homes especially due to affordability as well as technological advancements in most business enterprises and organizations, which allow ecommerce. In this context, one can easily shop and buy goods online without necessarily having to travel to the business premises. This mode of conducting business has boosted computer crimes, by creating an alternative avenue for defrauding unsuspecting customers, mostly through phishing (Quarantiello, 2006).

Phishing involves the creation and designing of rogue websites by criminals, imitating websites belonging to genuine businesses, with the intention of capturing personal information such as credit card numbers, passwords, among others; which is commonly known as identity theft. After attaining the details, criminals can access bank accounts and make purchases without the knowledge of the bank holder (Quarantiello, 2006). The internet comprises of numerous sites, most of which are genuine but with some designed to spread malicious programs and computer viruses (Gollmann, 2005).

These sites are difficult to suspect and they create curiosity in the user by displaying attractive messages in form of pop up menus, prompting the user to click, for example to unhide a free gift. The user can also be attracted to downloading free software such as music, videos, antivirus, or screen savers, without knowing that these soft wares are attached to destructive computer viruses. In addition, spyware programs can also be downloaded into a personal computer through the same processes (Gollmann, 2005).

Spyware monitors the activities of the user for example key strokes, frequently accessed sites among others and through this, criminals may get information which may assist them in hacking online accounts such as Facebook, Twitter etc after which they become able to make use of the account as if it was their own. In worse conditions, such a computer may be used to remotely to broadcast spam over the internet or to cripple other systems through denial of service attacks. In fact, research indicates that approximately 20000 personal computers are being attacked to perform such activities on each and every day (Quarantiello, 2006).

Conclusion Home personal computers are at an equal or more risk of security attacks as long as they are connected to a network or the internet. Some of the risks involved are for example identity theft through phishing, attack by computer viruses downloadable from the internet together with freeware and shareware, as well as hacking by criminals who use spyware to monitor computer usage and extract vital security information such as passwords. As a result, users are advised to be extremely careful with websites requesting for personal information as well as be cautious while downloading free software from the internet.

Most importantly, they should install genuine and updated antivirus and antispyware programs to shield their systems from intrusion. References Gollmann, D. (2005). Computer Security, John Wiley & Sons Quarantiello, L. (2006). Cyber Crime: How to Protect Yourself from Computer Criminals, Tiare Publications

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Potential security threats on a home personal computer Essay”, n.d.)
Retrieved from https://studentshare.org/other/1405875-potential-security-threats-on-a-home-personal
(Potential Security Threats on a Home Personal Computer Essay)
https://studentshare.org/other/1405875-potential-security-threats-on-a-home-personal.
“Potential Security Threats on a Home Personal Computer Essay”, n.d. https://studentshare.org/other/1405875-potential-security-threats-on-a-home-personal.
  • Cited: 0 times

CHECK THESE SAMPLES OF Potential security threats on a home personal computer

Fear and Loathing on MySpace.com

When dad asks his 12 year-old daughter what she is doing on the computer, her likely reply will be, 'Just hanging out'.... This was on a school computer with close supervision.... ow easy is it for someone to pretend to be a different age or gender on MySpace According to computer security expert Richard Carlotti, anyone can do it.... Though MySpace has made a token effort to tighten their age restrictions, they are well aware of the loopholes in security....
8 Pages (2000 words) Personal Statement

The Decision to Pursue a Masters in Computer Science

The very first factor is my innate affinity towards computer science that has driven me ahead throughout my life.... There I got chances to come closer Personal ment I think my decision to pursue masters in computer Science and computer Engineering is justified by a large number of reasons which are listed here.... The very first factor is my innate affinity towards computer science that has driven me ahead throughout my life....
2 Pages (500 words) Personal Statement

The Nature of Information and Computer Security

For my part, I would say that your interpretation of the laws present provided me, and other readers, with the much-needed insight into what happens when one breaks laws with regards to computer and information security.... The author of this work states "You brought to light some of the various laws that cover security in relation to the technological world, and how individuals who break the law may be handled in a court of law"....
1 Pages (250 words) Personal Statement

Future Studies at Saudi Electronic University

Having worked there since the Spring 2014 school term, I have come to realize that while my masters degree has helped me… The computer world evolves in terms of information technology practically as fast as the days and seasons change.... The computer world evolves in terms of information technology practically as fast as the days and seasons change.... As an experienced class lecturer, I know that my students have a tendency to go a few steps ahead of me in terms of their computer know-how since they are allowed the freedom to experiment with the technology and see where it goes....
2 Pages (500 words) Personal Statement

Software as a Service Methodology

I have two more certificates, one of computer Hacking Forensic Investigator (CHFI) v8 from EC- Council and another from Access Data which is of Mobile Device Forensics (Kealey, 2005).... I am highly proficient in computer skills and can easily operate different operating systems.... SQL injection and XSS are web penetration testing (pentest) which is helpful in attacking the computer system (ethical hacking) to gain information about the weakness of the security....
2 Pages (500 words) Personal Statement

Application to Study Computer Information Systems

I choose computer Information System at this University due to its reputation, the number of research and distinguished professors, and speed hiring graduates of this University. Apparently, my fascination with… As I was growing, I had many incidents that encouraged me to choose to study toward getting in computer Information System.... My father was a sales manager Application to study CIS I am writing to request acceptance to computer Information System....
2 Pages (500 words) Personal Statement

Transportation Security

The writer of the paper “Transportation security” states that to a nation like the USA, which is both a developed and developing country, the issue can bring down the nation.... Establishment of Transportation security Administration (TSA) to respond to the September 11th attacks is the body in charge of ensuring national and aviation security for the nation.... The body is guided by their mission that is to civil aviation areas and developing recommendations for the improvement of security methods, procedures, and equipment....
6 Pages (1500 words) Personal Statement

Internship Preparation Analysis: Gulf Center for Aviation Studies

As an organization that uses some of the most advanced technologies training as well as administrative purposes, GCAS requires a well-equipped IT department that oversees all IT operations including security and networking.... As an IT security & Networking, then GCAS is a suitable internship destination....
6 Pages (1500 words) Personal Statement
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us