Cyber Security

 


Computer Security

 

Jose Osorio

The University of Arizona Global Campus

TEC 101 Fundamentals of Information Technology & Literacy

Ali Abedin


 

 

Phishing is derived from the action of fishing, where bait is placed on a hook, and one hopes a fish bites. In the context of cybersecurity, phishing occurs when a scammer creates a website or email that appears deceptively authentic, akin to a fishing lure. Individuals may unsuspectingly click on these fraudulent links and inadvertently disclose personal or work-related information. While these deceptive websites may convincingly mimic legitimate ones, there are discernible signs that can help identify their illegitimacy, highlighting attempts to pilfer sensitive information.

Several key statements, as outlined on a government website, can serve as red flags:

·         Claims of noticing suspicious activity or login attempts—when, in fact, there have been none.

·         Assertions of a problem with your account or payment information—when there is none.

·         Requests to confirm personal or financial information—when no such verification is necessary.

·         Inclusion of an unrecognized invoice—indicating a fraudulent attempt.

·         Urging you to click on a link for payment—while the embedded link harbors malware.

·         Declarations of eligibility for a government refund—indicating a scam.

·         Offers of free stuff through a coupon—likely not genuine (Heras et al., 2023).

If someone falls victim to one of these traps, the scammer gains access to their personal information, which is then exploited for further malicious activities. When scammers request personal information, their intention is not to verify its accuracy but to seize it once the unsuspecting victim provides it. Vigilance and awareness of these common phishing tactics are crucial in safeguarding against such cyber threats.

 

Computers can get infected with viruses, like humans. Just like humans, viruses can spread from computer to computer. A virus will make a computer perform actions without the user's permission, with the goal of stealing information and sending it back to the creator. The most common way to get a virus is through email. Once the email is opened, the computer becomes infected. Other common sources of infection include free game hosts, illegal free music downloads, and free adult video sites.

To illustrate the scale of virus wrongdoing, one of the biggest viruses in history was in 2004, known as the Mydoom virus. According to HP Tech, “Mydoom caused estimated damage of $38 billion in 2004, but its infection-adjusted cost is actually $52.2 billion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent.” (Gerencer , 2020) security holes and vulnerabilities in the operating system, if the software is not updated, a cyber-attack can penetrate and gain access to the information. While computer viruses need the human factor to be introduced, such as through email scams, someone needs to click and allow the virus to download, making email the most common entry point nowadays. Phishing is another scam that requires the human factor, as a computer becomes vulnerable when the person enters the personal data requested by the phishing scam. A computer is vulnerable to all of these scams and will exhibit symptoms when compromised. One of the biggest signs is the way a computer runs. A computer will run slow and sluggish when infected with a virus. Not only will it be slow, but it may also perform actions on its own, such as sending emails.

 

In conclusion, these cyber incidents cause a lot of inconvenience and capital loss. After my reading, I have learned that there are still ways to protect computers and users. This includes having security software, keeping electronic software up to date, backing up your personal data, implementing two-step authentication, and lastly, being informed about cybersecurity.


 

 

Reference

Gerencer , T. (2020, November 4). The top 10 Worst Computer viruses in history. HP® Tech Takes. https://www.hp.com/us-en/shop/tech-takes/top-ten-worst-computer-viruses-in-history

Heras, G. de las, Tressler, C., Fair, L., & Puig, A. (2023, November 29). How to recognize and avoid phishing scams. Consumer Advice. https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams#recognize

 

Comments

Popular Posts