Thursday, October 17, 2019

CyberSecuirty Threats Essay Example | Topics and Well Written Essays - 500 words

CyberSecuirty Threats - Essay Example This compromise may include a covert computer terminal is connected to the same line through the telephone switching equipment and is then used when the legitimate user is not using the terminal. The computer cannot differentiate between the two terminals; it senses only one terminal and one authorized user (Peter & Allan, 20). A user may also improperly sign off when leaving a terminal session. Here, the intruder will find the terminal session in active state and access the user’s files as the computer believes the user is still active. The perpetrator may also use another form of piggybacking where they forward the call of the victim’s calls to the perpetrator’s phone (Peter & Allan, 120). Passwords are the other form of security verification methods implemented in computer networks and devices. With passwords, the user is required to enter secret digits or letters or both to provide access to a system or files in a system (Lynch, 401). Passwords have been in existence since long ago and are applicable in many fields such as in automated teller machines, mobile phones and computer operating systems (Peter & Allan, 70). However, passwords have been known to be cracked and as such very in strength where alphanumeric patterns of passwords offer the strongest passwords while simple letters or digits offer weak and vulnerable passwords (Peter & Allan, 80). Phishing in internet security is a form of crime that occurs in the internet. Here, deception is used to acquire someone’s or a company’s sensitive information such as their bank account details, credit card number, usernames and passwords. The culprit masquerades as a trustworthy party such as a bank or popular site (Lynch, 410). They in turn send emails or instant messages that are infected with malware and harm the unsuspecting victim. Once the message or email is opened the malware retrieves the user’s

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.