Friday, May 3, 2019

Questions Essay Example | Topics and Well Written Essays - 250 words - 11

Questions - Essay ExampleIt has been reported that GhostNet worked on behalf of the Chinese government. This group causes the rear computers to download the malicious softwargon and gives control of computers to attackers. The US department of Defence has been attacked so many propagation by this group (Lord & Sharp, 2011).Cyber attackers target the important official websites for breaching the important data. Threats of computer security are inventive, which are used to harm the individual as well as business computer systems. For example, the computer net profit of the White House was breached by hackers on October 2012. They used the spear phishing attack. Another incident occurred when federal IT ply of Canada was fooled by hackers as giving them access to computers of government offices. In this way, the hackers got the access of the government systems (Websene, 2012).Both, individuals and businesses can assemble the perimeters firewalls, which permit only the authorized us ers to access the network. The network can be protected from the attack defence mechanism of service by using the perimeter firewalls. An individual or business network administrator should assemble the email servers to remove or block the attachment of emails, which are used to spread the viruses, and other, many attacks. Individuals and businesses must keep the backups of their important data (Symantec Corporation, 2011).It is concluded that the information security is important from both inside and away attackers. Similarly, the data security from blended attacks must be ensured for both individuals and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.