Data Backups, Cloud Computing, Malicious Software, Anti-Virus, and Social Engineering
Summary
This paper discusses some important aspects of the security of computer and internet systems and their essential role in protecting confidential information and sensitive data from internal and external attacks. Understanding these concepts is vital because often knowledge they avail regarding how to safeguard the systems we use on a day-today basis. Such knowledge is particularly critical in the contemporary era, in which virtually all processes are automated, ranging from business, dealings to storing personal information. If an individual or business fails to understanding these concepts and their application, they experience unprecedented data, privacy, financial losses, and in other cases, expensive lawsuits.
Discussion
One important aspect in enhancing the safety of computer systems is by performing data backups. Backing up data entails copying files and folders and storing them safely in the event sensitive information is lost or stolen as implied by Carnegie Mellon University (2020). Data loss may occur due to viruses corrupting files, media faults, and hacking, human mistakes, among other causes. The other important aspect in networking systems is cloud computing, which, as noted by Ismail (2018), is a computing form that depends on mutual computer resources instead of relying on personal gadgets or local servers to manage applications. Cloud computing allows a user to access their applications and files from their internet-connected devices. Google’s Gmail is an excellent example of cloud computing. As services in the public sector and businesses increasingly depend on technology and the internet, the surface area of various forms of cyber attacks also increases. A good way to project sensitive information stored in the cloud is by ensuring compliance with the established security regulatory guidelines. Only by complying with the adhered security guidelines can information be adequately protected on the cloud.
Malicious software is another important element in computer and network systems. It denotes the malicious programs that damage a computer network or system. Such programs occur in various forms, including adware, viruses, trojans, and worms, among other types. When such forms of malicious software attack a computer network or system, they corrupt files containing vital information and render such systems inaccessible. They also present adverse system security risks that expose confidential information. As such, it is necessary to protect computer systems and networks form malicious software, which can be done in a variety of ways. For instance, a user must take caution when opening attachments and links. It is also advisable to update software regularly, change passwords after a while, and take data backups to avert loss in case an attack is successful. Still on protection, it is recommendable that a computer system that accesses the network have an anti-virus, which is a single or an array of programs built to protect, avert, locate, identify, and eradicate all software-attacking viruses as well as other malicious software such as adware and worms (Johansen, 2020). An anti-virus must be regularly updated to ensure that it is in keeping with the latest revisions to the software from the relevant provider.
Lastly, cyber attackers also manipulate users to gain access to protected computer systems. They trick users to breach the established security practices and gain rightful, sanctioned access to private information, an attack strategy commonly known as social engineering (Yasin, Fatima, Liu, Yasin & Wang, 2019). One example of social engineering s phishing, where an attacker seeks to obtain personal information, for instance, social security numbers, or use deceptive links that sends a user to another malicious website that hosts a phishing landing page. Other forms of social engineering attacks include tailgating, pretexting, and Quid Pro Quo. Preventing against social engineering attacks can be attained by cancelling all requests for passwords and private information and installing a regularly updated anti-virus system. Further, well-maintained and regularly updated email filters and firewalls are helpful protection against the assortment of malicious attacks used in social engineering.
References
Carnegie Mellon University. (2020). Intro to data management. library.cmu.edu/datapub/dms/data/secure
Gounder, M.P. and Farik, M. (2017). New ways to fight malware. International Journal Of Scientific & Technology Research, 6(06). http://www.ijstr.org/final-print/june2017/New-Ways-To-Fight-Malware.pdf
Ismail, N. (2018). Benefits of cloud computing security tools for data storage. https://www.information-age.com/cloud-computing-security-data-123470411/
Johansen, A. G. (2020). What is antivirus software? Antivirus definition. https://us.norton.com/internetsecurity-malware-what-is-antivirus.html
Yasin, A., Fatima, R., Liu, L., Yasin , A and Wang, J. (2019). Contemplating social engineering studies and attack scenarios: A review study. Security and Privacy, 2(4). https://onlinelibrary.wiley.com/doi/full/10.1002/spy2.73