Computer security threats and solutions
Computer Security Threats and Solutions
A computer security threat is anything that can lead to disruption/loss or corruption of data on the computer.
Computer security threats can be categorized in different types also physically damaging the hardware/software component of the computer is categorized as a common computer threat.
Computer users face cyber threat every day, knowing how you can protect/ prevent these cyberattacks is what we would teach you in this article.
A computer security threat is anything that can lead to disruption/loss or corruption of data on the computer.
Computer security threats can be categorized in different types also physically damaging the hardware/software component of the computer is categorized as a common computer threat.
Computer users face cyber threat every day, knowing how you can protect/ prevent these cyberattacks is what we would teach you in this article.
Types of computer threats
- Malware attacks.
- Botnet attacks
- Circumvention of passwords
- DDoS attacks
- Phishing attacks.
- Email spoofing.
We have listed some/ major computer security threats we face every day, let's proceed to know each one of these threats and solutions to countermeasure them.
We have listed some/ major computer security threats we face every day, let's proceed to know each one of these threats and solutions to countermeasure them.
Malware
Malware is/ are one common computer security threat that causes damage or infiltrates data in your computer.
Malware can also be regarded as malicious software/code that infects your computer.
Malware is/ are one common computer security threat that causes damage or infiltrates data in your computer.
Malware can also be regarded as malicious software/code that infects your computer.
Types of malware
- Viruses
- Worms
- Trojan horses
- Spyware
- Ransomeware
Malware stands as major computer threats, it does lots of damage to your computer.
Virus:
A virus is/ are malicious programs that destroy files and also replicate itself. It usually requires a third party for it to infect a computer.
A virus is/ are malicious programs that destroy files and also replicate itself. It usually requires a third party for it to infect a computer.
Worms:
Worms are a self-replicating program that spread malicious codes to the computer. It makes use of the computer network to send copies of original codes to other computers/ PCS.
Worms are a self-replicating program that spread malicious codes to the computer. It makes use of the computer network to send copies of original codes to other computers/ PCS.
Trojan Horse:
Trojan horse is/ are malicious software that behaves like a good software for it to by-pass the computer security and infect the computer with its malicious code.Spywares:
Spywares are malicious software that steals data from a computer. They copy data/ documents and send them to the hacker. They also can record keystrokes from your keyboard, copy passwords, take screenshots of your computer.
Spywares are malicious software that steals data from a computer. They copy data/ documents and send them to the hacker. They also can record keystrokes from your keyboard, copy passwords, take screenshots of your computer.
Malware: Computer Threat
- Malware alters/ delete files from your computer.
- Malware send sensitive data from your computer.
- Malware can format/ clear content from your hard drive without your consent.
- Malware copies sensitive files from your system and sends it to its allocated address.
- It can destroy your computer.
- Send data without your prior consent.
Botnet
A Botnet is a system of link internet computers each running with a bot. A botnet creates several 'bots' that infects the computer. They are remotely controlled by their originator. Your computer might be one of them but you might not even know.
A Botnet is a system of link internet computers each running with a bot. A botnet creates several 'bots' that infects the computer. They are remotely controlled by their originator. Your computer might be one of them but you might not even know.
Botnet: Computer threat
A botnet is/ are also computer security threats that can do the following.
- A botnet can spread malware.
- It can use your computer to perform several cyber attacks.
- Can send spam emails with viruses/ spyware immersed in them.
A botnet is/ are also computer security threats that can do the following.
Circumvention of password:
Circumvention of password is a process whereby a hacker invades/ breaks into a computer to steal passwords, using different tools/ software.
Circumvention of a password is a common computer threat that people face every day, part of its greatest disadvantages includes;
- Illegal access to a computer.
- Modifying content you shouldn't have access to.
- Intruding the privacy of a user.
Circumvention of password is a process whereby a hacker invades/ breaks into a computer to steal passwords, using different tools/ software.
Circumvention of a password is a common computer threat that people face every day, part of its greatest disadvantages includes;
DDoS Attack
DDoS (Distributed Denial Of Service) attack involves a malicious user using several zombie computers to sabotage/ destroy a website or server.
This is easily done when a malicious user sends traffics to a computer /server over and over again, this increases traffic and thereby causing the website to slow, thereafter, crashing the server or website.
It is also possible for your computer to be used to perform these attacks. These can be done when a malicious user takes advantage of your computer vulnerabilities to 'distribute' these attacks or spam emails since this is a 'distribution' process, your computer can also be used to perform DDoS attacks.
DDoS (Distributed Denial Of Service) attack involves a malicious user using several zombie computers to sabotage/ destroy a website or server.
This is easily done when a malicious user sends traffics to a computer /server over and over again, this increases traffic and thereby causing the website to slow, thereafter, crashing the server or website.
It is also possible for your computer to be used to perform these attacks. These can be done when a malicious user takes advantage of your computer vulnerabilities to 'distribute' these attacks or spam emails since this is a 'distribution' process, your computer can also be used to perform DDoS attacks.
DDoS: Computer threats
DDoS performs the following attacks on a website or server.
- Sends unwanted traffic to a website or server.
- Install firewalls and automatically configure traffic coming into or leaving your computer.
- Crashes a server.
DDoS performs the following attacks on a website or server.
Phishing Attack
Phishing is an act of sending a “Replica” or malicious file to a target to gain information from them I.e. Banking details, username, and password.
Phishing is an act of sending a “Replica” or malicious file to a target to gain information from them I.e. Banking details, username, and password.
Thus, it’s a malicious act that involves 'forging a site' that looks like a real website, by simply modifying its Url i.e. (www.google.com) to (www.g00gle.com) and copying its page source code, thereby modifying it and hosting it to a Domain to make a user convinced it’s the real website.
A user might not be aware of these links and might think it’s a genuine link that directs them to the real website or sometimes a file they needed to check on, these links are made to steal data from you.
Phishing Attack: Computer threat
A phishing attack is a common computer threat that can allow a malicious user to perform the following.
- Stealing sensitive content from a computer.
- Having access to a private document stored in a computer.
- Stealing/ changing a user password.
- Engage in data espionage.
- Subduing of data.
A phishing attack is a common computer threat that can allow a malicious user to perform the following.
Email Spoofing
Email spoofing is an act of sending a forged email to an individual. This is done by changing the MAIL FROM of an email to the spoofed email.
For example.Alice's computer is being infected and Bob and Charlie's email addresses are collected from Alice's computer, the Malware is used to send a spoofed email to Charlie thinking the messages was from Bob.
RANSOMWARE
Ransomeware is a type of computer threat that restricts a user from using the computer by prompting a pop up which restricts you from using the computer unless you pay a certain amount.
Ransomeware has been a serious computer threat that people face every day. One of the easiest ways to get attacked by ransomware is by clicking on phishing links or malicious advertisements.
Ransomeware is a type of computer threat that restricts a user from using the computer by prompting a pop up which restricts you from using the computer unless you pay a certain amount.
Ransomeware has been a serious computer threat that people face every day. One of the easiest ways to get attacked by ransomware is by clicking on phishing links or malicious advertisements.
Ransomeware: Computer threat
Ransomeware can perform the following on someone's computer.
- Lock users screen.
- Prevent users from accessing their files.
- Encrypt your files and disallow you from accessing them.
Ransomeware can perform the following on someone's computer.
HOW TO PREVENT COMPUTER SECURITY THREAT
Computer security threats can be prevented when you employ the following computer security measures.
- Passwords are like underwear, you have to change them every time.
- Verifying links before you click them.
- Always look out for links before you click them.
- Don’t download a file when you are not sure of the website.
- Always verify if a website is genuine, do not just provide informations to websites anyhow.
- Look out for the HTTP if it is an HTTP(s) the s stands for secure.
- Porn links are mostly affected links.
- Don’t chat with a malicious crafted email, if you notice any malicious intent block the account immediately.
- Keep sensitive informations safe always.
- Don’t give full access to workers, workers should be given limited access to informations.
- Scanning of files or attachment before download.
- Confirm the file extension of an attachment before you open them for a PDF file, the file extension should have (.PDF).
- Don’t click on anyhow links on Facebook, yahoo, or anywhere.
- Don't provide your information to a suspicious person who calls you over the phone.
- Use strong antivirus software.
- Regularly update your Operating system and antivirus.
Computer security threats can be prevented when you employ the following computer security measures.
No comments