This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
War

  Data Backups, Cloud Computing, Malicious Software, Anti-Virus, and Social Engineering

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

Data Backups, Cloud Computing, Malicious Software, Anti-Virus, and Social Engineering

Summary

This paper discusses some important aspects of the security of computer and internet systems and their essential role in protecting confidential information and sensitive data from internal and external attacks. Understanding these concepts is vital because often, the knowledge they avail regarding how to safeguard the systems we use daily. Such knowledge is particularly critical in the contemporary era, in which virtually all processes are automated, ranging from business dealings to storing personal information. If an individual or business fails to understand these concepts and their application, they experience unprecedented data, privacy, financial losses, and in other cases, expensive lawsuits.

Discussion

One crucial aspect in enhancing the safety of computer systems is performing data backups. Backing up data entails copying files and folders and storing them safely in the event sensitive information is lost or stolen, as implied by Carnegie Mellon University (2020). Data loss may occur due to viruses corrupting files, media faults, hacking, and human mistakes, among other causes. The other important aspect that features in networking systems is cloud computing, which, as noted by Ismail (2018), is a computing form that depends on mutual computer resources instead of relying on personal gadgets or local servers to manage applications. Cloud computing allows a user to access their applications and files from their internet-connected devices. Google’s Gmail is an excellent example of cloud computing.  As services in the public sector and businesses increasingly depend on technology and the internet, the surface area of various forms of cyber-attacks also increases. An excellent way to protect sensitive information stored in the cloud is by ensuring compliance with the established security regulatory guidelines. Only by complying with the adhered security guidelines can information be adequately protected on the cloud.

Malicious software is another crucial element in computer and network systems. It denotes the malicious programs that damage a computer network or system. Such programs occur in various forms, including adware, viruses, trojans, and worms, among other types. When such forms of malicious software attack a computer network or system, they corrupt files containing vital information and render such systems inaccessible. They also present adverse system security risks that expose confidential information. As such, it is necessary to protect computer systems, and networks from malicious software, which can be done in a variety of ways. For instance, a user must take caution when opening attachments and links. It is advisable to update software regularly, change passwords after a while, and take data backups to avert loss if an attack is successful. Still, on protection, a computer system that accesses the network should have an anti-virus. An anti-virus is a single or an array of programs built to protect, avert, locate, identify, and eradicate all software-attacking viruses and malicious software, such as adware and worms (Johansen, 2020). An anti-virus must be regularly updated to ensure that it is in keeping with the latest revisions to the software from the relevant provider.

Lastly, cyber attackers also manipulate users to gain access to protected computer systems. They trick users into breaching the established security practices and gaining rightful, sanctioned access to private information, an attack strategy commonly known as social engineering (Yasin, Fatima, Liu, Yasin & Wang, 2019). One example of social engineering is phishing, where an attacker seeks to obtain personal information deceptively. Other forms of social engineering attacks include tailgating, pretexting, and Quid Pro Quo. Preventing against social engineering attacks can be attained by canceling all requests for passwords and private information and installing a regularly updated anti-virus system. Further, well-maintained and regularly updated email filters and firewalls are effective protection against the assortment of malicious attacks used in social engineering.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Carnegie Mellon University. (2020). Intro to data management. library.cmu.edu/datapub/dms/data/secure

Gounder, M.P. and Farik, M. (2017). New ways to fight malware. International Journal Of Scientific & Technology Research, 6(06). http://www.ijstr.org/final-print/june2017/New-Ways-To-Fight-Malware.pdf

Ismail, N. (2018). Benefits of cloud computing security tools for data storage. https://www.information-age.com/cloud-computing-security-data-123470411/

Johansen, A. G. (2020). What is antivirus software? Antivirus definition. https://us.norton.com/internetsecurity-malware-what-is-antivirus.html

Yasin, A., Fatima, R., Liu, L., Yasin , A and Wang, J. (2019). Contemplating social engineering studies and attack scenarios: A review study. Security and Privacy, 2(4). https://onlinelibrary.wiley.com/doi/full/10.1002/spy2.73

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask