Saturday, June 15, 2019

Questions Essay Example | Topics and Well Written Essays - 250 words - 11

Questions - Essay ExampleIt has been reported that GhostNet worked on behalf of the Chinese government. This group causes the target calculators to download the cattish software and gives control of computers to attackers. The US department of Defence has been attacked so many times by this group (Lord & Sharp, 2011).Cyber attackers target the important official websites for breaching the important data. Threats of computer warranter are inventive, which are employ to harm the individual as well as business computer systems. For example, the computer network of the White tolerate was breached by hackers on October 2012. They used the spear phishing attack. Another incident occurred when federal IT staff of Canada was fooled by hackers as giving them opening to computers of government offices. In this way, the hackers got the access of the government systems (Websene, 2012).Both, individuals and businesses can install the perimeters firewalls, which permit only the authorized us ers to access the network. The network can be protected from the attack Denial of service by using the perimeter firewalls. An individual or business network administrator should configure the email servers to remove or block the attachment of emails, which are used to spread the viruses, and other, many attacks. Individuals and businesses must keep the backups of their important data (Symantec Corporation, 2011).It is concluded that the information security is important from both inside and outside attackers. Similarly, the data security from blended attacks must be ensured for both individuals and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.