AllBestEssays.com - All Best Essays, Term Papers and Book Report
Search

Defense Plan to Prevent Attacks

Essay by   •  June 6, 2011  •  Essay  •  721 Words (3 Pages)  •  3,287 Views

Essay Preview: Defense Plan to Prevent Attacks

Report this essay
Page 1 of 3

Defense Plan to Prevent Attacks

There are many different external threats, vulnerabilities, and insider security threats that have existed in Aim Higher College IT Infrastructure. The best way to deal with any kind of a threat current or future is through hard training of IT Management staff and general employees of the institution, will it be Administration or Faculty. The second most important way to deal with threats is to have a thorough Disaster Recovery Plan that is in place for all employees of the AHC. So when the disaster or breach of systems strikes, IT personnel can follow a good guideline and procedure to recover from things like malware, viruses, Trojans, Worms, hacking attacks, breach of security, and even insider threats from disloyal employees.

Malware consists of programming code, scripts, active content, and other software designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior. The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior. The term computer virus is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables.

Viruses may also contain a payload that performs other actions, often malicious. On the other hand, a worm is a program that actively transmits itself over a network to infect other computers. It too may carry a payload.

Trojan horse is any program that invites the user to run it, concealing a harmful or malicious payload. The payload may take effect immediately and can lead to many undesirable effects, such as deleting the user's files or further installing malicious or undesirable software. Trojan horses known as droppers are used to start off a worm outbreak, by injecting the worm into users' local network.

The issues related to the security of the computer systems worldwide is fast becoming a concerned issue. From the email viruses, to the software Trojans and the online worms, we are plagued constantly by the many threats that mar the security of our computers resulting in the loss of much more than valuable data. With the cyber crimes growing on the World Wide Web, every effort that we put in pertaining to the security of our systems comes as a relief.

The spyware, viruses and malware are known to make the internet access prone to getting attacked by the many types of viruses that are rampant on the internet. Therefore, it is empirical to protect the personal informational prior to opting for anything else. Make sure that the links, websites or the portals that you visit in order to search for relevant data or simply to enjoy the benefits of online shopping are secure and have http in the start of the URL. Similarly, make sure to create stronger passwords

...

...

Download as:   txt (4.2 Kb)   pdf (70.6 Kb)   docx (10.3 Kb)  
Continue for 2 more pages »
Only available on AllBestEssays.com