Week 5 - DQ1 - It is important to protect ones computer...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Through experience, it has come to be known that storing information electronically can increase the potential for unauthorized data access. Fraud, abuse, theft, and destruction can all result from a poorly designed network. On the most basic level, a physical data breach can occur. This is when an individual manually enters a location (in which information is held) and either manipulates or steals it. This occurs mainly due to poor “hands-on” security. In a more technological manner, data can be stolen electronically. This is done by either “hackers” or “crackers”. These thieves are able to steal information due in part to their high understanding of the internet; and other computer based technologies. Many of these hackers make use of malicious programs. Some of [these] include but are not limited to: malware software, spyware programs, trojans, worms, and viruses. These utilities are designed to alter, take control of, or steal information on the victim’s computer.
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: It is important to protect ones computer from such devastating tools for a variety of reasons. Perhaps you store sensitive information on your computer (e.g. credit card numbers, social security information). Maybe ones business propositions are saved on a computer. Whatever the reason, it is not wise to leave a computer unsecure. Thankfully there are a variety of programs designed to battle these devastating infections. Some of these software’s come in the form of antivirus utilities. Examples of such programs are: Norton Security, ESET NOD32, and Avira Antivirus. There are also programs designed to seek and destroy spyware, adware, and malware. Two examples of such programs are: Spybot S&D and Adware. Evidently, there are many opportunities for an individual to fall victim to information thieves. The best thing for a consumer to do is follow good web practices and be vigilant while surfing the internet....
View Full Document

This note was uploaded on 10/17/2010 for the course IT 205 IT 205 taught by Professor Taylor during the Spring '09 term at University of Phoenix.

Ask a homework question - tutors are online