04 Aug Explain three ways that computer users can be victimized by computer security risks and computer crime.
Explain three ways that computer users can be victimized by computer security risks and computer crime. Explain each in detail. What can someone do to protect themselves from these risks?
Make sure to be detailed in your response and make sure to comment on at least two other student’s posts.
Classmate post # 1
The first, and easiest way in my experience to get victimized by a computer security risk is by opening an email from an unknown sender. When the email is opened, it opens a link, back door, or rootkit, that allows the virus or person to infect your computer or take control of it. There are reasons that require allowing someone else to control your computer from their location if you need tech support to help. An important way to prevent any hackers from joining in on the rootkit or infecting your email with viruses is to have a personal firewall, phishing filter, antivirus program previously installed prior to allowing access into your computer, or any device for that matter.
A second way to get a virus is through pop-ups. When the user clicks on a new site while researching, if the site is unprotected or requires the user to allow cookies, they are allowing access to their device via their website. A great way to protect against pop-ups is with adware, personal firewall, anti-spam programs, pop-up blockers, and web filtering software.
A third common way of getting victimized by a computer crime is simply hackers using a code breaker to get into your social media profiles. When an app is downloaded and linked to your Facebook account to share your progress in a game, that provides your basic personal information- name and email, or name and phone number, or more linked social media accounts. A way to prevent your social media accounts from being hacked into is by not opening messages from strangers, not accepting friend requests from people you do not know personally, and by not linking every game you enjoy playing to your accounts to share your progress. On a computer, your firewall, antivirus programs, spyware, adware, and phishing filters can prevent any online account of yours from being broken into. But on your phone, especially while using public Wi-Fi, these protection apps and software’s are even more important. Some things might be safer to wait to open at home with a protected software installed and on your own IP address.
Class mate post # 2
Unfortunately, at this point I think most of us have experienced some type of computer security fraud.
1. Phishing is when a scammer will send an email to you and usually, it looks legit. It usually has the name of a person or company you are already familiar with. Usually the email will contain a link or ask specific questions that will aid them in gaining access to sensitive information.Unfortunately, at work, I always have to be on the look out for these types of emails. I have been able to spot a couple and save our District the headache of being hacked. When I come across an email that seems odd, I forward it to our IT department and he checks it out and lets me know whether or not it’s safe. Usually they are, but about two times they were real Phishing emails. IT then emails the entire District and instructs us to not open the following email from the said emailer. Boom, nightmare avoided! It is very important to have an excellent program and excellent employees who can spot these types of things. It is also important to educate yourself and staff on what this looks like and what to do if you come across it.
2. Financial Identity Theft comes in many forms, one of the most common being credit/debit card fraud. Hackers obtain your personal and financial data from your online shopping habits to hack into your bank account and steal funds. Alot of the time, the amounts are very small, 50 cents, or a couple of dollars but when theyre doing it to millions of unsuspecting victims, it adds up. My husband has had this happen to him a few times unfortunately. It helps to have a good bank that has good fraud detection services. Usually within a day or so, the bank should call you to go over your expenses to verify these odd transactions. If you cannot confirm that you made these purchases, they will shut down your cards and issue new ones. Having to delete your old cards from online shopping sites and bill pay is a hassle but thank goodness for the banks IT department that catches these hackers before you loose everything.
3. Malware is basically an infection that gets access to your computer and all of its information via fraudulent software, an unprotected computer, infected USB and other devices, etc.In the early 2000’s there was a music app called Limewire. Not only was it illegally letting people have music for free but it was also notorious for giving your computer viruses. Back then, we didn’t have all the music downloading apps that we have now like, Apple music, Spotify, Napster, etc. This was when we were barely coming into downloading music. No one wanted to buy CD’s anymore, downloading was much easier and on Limewire you could do it for free, but it came with huge risks. Malware risks to your computer, the choice was yours! Anti-virus software also became more popular during that time. A good anti-virus program will keep you safe from Malware but also, staying away from fraudulent activity and sketchy websites will also go a long way.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.