Cyber Security
Computer
Security
Jose Osorio
The
University of Arizona Global Campus
TEC 101
Fundamentals of Information Technology & Literacy
Ali Abedin
Phishing is derived from the action
of fishing, where bait is placed on a hook, and one hopes a fish bites. In the
context of cybersecurity, phishing occurs when a scammer creates a website or
email that appears deceptively authentic, akin to a fishing lure. Individuals
may unsuspectingly click on these fraudulent links and inadvertently disclose
personal or work-related information. While these deceptive websites may
convincingly mimic legitimate ones, there are discernible signs that can help
identify their illegitimacy, highlighting attempts to pilfer sensitive
information.
Several key statements, as outlined on a government website,
can serve as red flags:
·
Claims
of noticing suspicious activity or login attempts—when, in fact, there have
been none.
·
Assertions
of a problem with your account or payment information—when there is none.
·
Requests
to confirm personal or financial information—when no such verification is
necessary.
·
Inclusion
of an unrecognized invoice—indicating a fraudulent attempt.
·
Urging
you to click on a link for payment—while the embedded link harbors malware.
·
Declarations
of eligibility for a government refund—indicating a scam.
·
Offers
of free stuff through a coupon—likely not genuine (Heras et al., 2023).
If
someone falls victim to one of these traps, the scammer gains access to their
personal information, which is then exploited for further malicious activities.
When scammers request personal information, their intention is not to verify
its accuracy but to seize it once the unsuspecting victim provides it.
Vigilance and awareness of these common phishing tactics are crucial in
safeguarding against such cyber threats.
Computers can get infected with viruses, like humans. Just
like humans, viruses can spread from computer to computer. A virus will make a
computer perform actions without the user's permission, with the goal of
stealing information and sending it back to the creator. The most common way to
get a virus is through email. Once the email is opened, the computer becomes
infected. Other common sources of infection include free game hosts, illegal
free music downloads, and free adult video sites.
To illustrate the scale of virus wrongdoing, one of the
biggest viruses in history was in 2004, known as the Mydoom virus. According to
HP Tech, “Mydoom caused estimated damage of $38 billion in 2004, but its
infection-adjusted cost is actually $52.2 billion. Also known as Novarg, this
malware is technically a “worm,” spread by mass emailing. At one point, the
Mydoom virus was responsible for 25% of all emails sent.” (Gerencer , 2020)
security holes and vulnerabilities in the operating system, if the software is
not updated, a cyber-attack can penetrate and gain access to the information.
While computer viruses need the human factor to be introduced, such as through
email scams, someone needs to click and allow the virus to download, making
email the most common entry point nowadays. Phishing is another scam that
requires the human factor, as a computer becomes vulnerable when the person
enters the personal data requested by the phishing scam. A computer is
vulnerable to all of these scams and will exhibit symptoms when compromised.
One of the biggest signs is the way a computer runs. A computer will run slow
and sluggish when infected with a virus. Not only will it be slow, but it may
also perform actions on its own, such as sending emails.
In conclusion, these cyber incidents cause a lot of
inconvenience and capital loss. After my reading, I have learned that there are
still ways to protect computers and users. This includes having security
software, keeping electronic software up to date, backing up your personal
data, implementing two-step authentication, and lastly, being informed about
cybersecurity.
Reference
Gerencer ,
T. (2020, November 4). The top 10 Worst Computer viruses in history. HP®
Tech Takes. https://www.hp.com/us-en/shop/tech-takes/top-ten-worst-computer-viruses-in-history
Heras, G. de las, Tressler, C.,
Fair, L., & Puig, A. (2023, November 29). How to recognize and avoid
phishing scams. Consumer Advice. https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams#recognize


Comments
Post a Comment