Introduction our computer systems are because we are

Introduction

 

        In today’s society technology is
advancing at a fast rate where almost everyone is able to connect with others
from across the globe in just a click of a button. Most important, documents
are in a “cloud” where you are able to access it easily on any device instead
of the old fashion piece of “paper”. But, most people stop to realize how
unsecure their personal information is, the more advanced technology is
becoming the more unsecure your personal information. Now, there are multiple
people who can have illegal access information and it’s happening every min.
Technology has became a necessity to our daily lives making everything easier
and faster to connect with others but there are a lot of dangers that come with
it such as cyber-attacks.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

        Cybercrimes are done by individuals who
are called “hackers”. Hackers are individuals who seek computer system attacks.
The hackers are able to see of any form of IT devices such as computers,
phones, tablets and many other things as well. (Definition of Hacker) devices  that are used to access and control your data
files like vulnerability scanners, password cracking logging, etc.. Most
hackers do most of their work from the comfort of their home behind a computer
screen at any time they please. (Wikipedia)

     Hackers can happen when you least expect
it, cyber-attacks are malicious acts usually originating from anonymous sources
that either steal, alter or destroy a specific data file in the computer
system. (Definition of Cyber-attack)Everyone is effected by cyber-attacks all
over the world because technology is advancing in today’s society.

Defining
the Problem

      The main reasons why this problem won’t
go away is because the more advanced technology is becoming the easier we are
making it for cyber-attackers (hackers) to access our data files. Many reasons
why we are making things easier for cyber-attackers to break into our computer
systems are because we are not persistent when it comes to knowing what, when,
where, why, and how is our data being used, we are lacking in data protection
and use weak passwords. (Jim Ivers, 3 Critical Truths about Data Security, Techopedia)
We are all irresponsible when it comes to the simple procedures used to keep
our data protected, we should always know where we are sending our data files.
Just in case if something was to go wrong with the data file we could be able
to know exactly where to find it and how to stop it immediately.

       Encryption of data will not be effective
alone, there needs to be persistency for data security. The act of sending out our
information is giving the receiver full control over it, when you send out any
data files to someone without protecting it you are basically giving them the permission
to alter anything on that document giving them part ownership of the document.
Some people may even revise the document in a way to harm or threaten you
because the document came from your IP address, misuse of technology. Some
people even stated that constant updates of software and programs cannot make
you completely protected from hackers. “I believe software companies hire
hackers to hack into computers so that you have to purchase Anti-Virus
protection from them. The hackers then use their knowledge to hack into
computers and steal information …” (Mentor Interview, Margarita Beckford)Common
cyber-attacks happens unexpectedly and when it is not dealt with right away it
can cause a very big problem. Credit Cards fraud is a perfect example of how
carless we can be with our personal information.

     Now, most credit card users would not expect
their personal information to be stolen from a common restaurant like Jimmy
John’s, a sandwich franchise.  The
sandwich franchise both corporate and franchised locations were affected by a
data breach in approximately 216 locations, the hacker was able to obtain 56
million credit and debit cards. Other businesses were also attacked by the
hackers such as Neiman Marcus and P.F. Changs. (Kate Taylor, Another Hacker..,
Entrepreneur.com)

      No
individual would expect their favorite restaurant to be a cause of their personal
information being stolen. Being aware and constantly checking your bank
statements on your card decreases your chances of being affected by the
cyber-attacks. Being persistent with who, what, when and where can make cyber
security more effective and cyber-attacks preventable.

      Protecting your personal information
decreases your chances of being a victim of a cyber-attack, and using passwords
is one of the many ways of keeping hackers out. When it comes down to creating
a password everyone likes to get creative and critical to ensure their account
and information is sealed from outsiders. But, hackers are still able to crack
your password being using multiple techniques and devices like using Brute
force attack, password cracking, and Spoofing attack (Phishing). Brute attack
and password cracking are the common techniques used to crack a code by
recovering frequently used passwords from data that’s storage like a dictionary
attack in a computer system. Spoofing attack is a much faster process using a
program, system or website to falsify data which is treated as a trusted system
to give the hacker full granted access to enter into your personal information
and accounts. (Hackers,Wikipedia.com)

      Solutions and Procedures

   It is almost impossible to avoid being a
victim of cybercrimes completely because everyone is a user of some form of
technology device and most of important information stored on some computer
system. Which makes hackers have multiple ways of accessing different information
from all over the world. There are ways to prevent and or decrease your chances
of becoming a victim, users must install and keep up-to-date antivirus
programs, firewalls and spyware checkers. Along with keeping them up to date,
users must make sure that they run the scans regularly.

**Persistent control adds
a bonus to relocating data on any device, thus preventing any misuse, also
giving you awareness the location of your data file if any cyber-attacks were
to occur. Being persistent about the whereabouts of what, when, and where your
information is being used helps authorities to stop the attack before any real
damage is done.

     There are many companies out there that
provide free software, but there are other you can purchase, along with that of
the many produced by the leading companies providers; in addition, those
companies provide free version of their paid or subscription antivirus
software. Encryption of information that you do not want anyone to have
unauthorized access to is a good way to avoid some cybercrimes; information
such as password and credit card information for example. Encryption software
runs your data through encryption algorithms to make it unintelligible to
anyone who tries to hack into your computer.

Another good precaution
is to be weary of who you divulge your personal information to. Try to avoid
unknown websites, in particular those that ask for your name, mailing address,
bank account number or social security number. When doing online shopping make
sure website is secure, look for urls that starts with “https”and/or have the
Trustee or VeriSign seal. If you do not see these anywhere on the site, you run
the risk of submitting credit card information and other personal information
to a site that maybe a fraud.

Conclusion

 

      In conclusion, cyber-crimes will always
be a continuous crime that will be hard to stop completely but there are many
ways to make sure you are not a victim of a cyber-attack and your personal
information is protected. The everyday users and big companies need to be
educated on the new programs and software to help prevent and protect the data
files storage. Being aware and persistent are the basic procedures.

    
Nevertheless,
business should employ practices where their employees follow proper safety
practices to ensure that integrity and confidentially of stored information is
kept at all times to combat cybercrimes. Safety practices like ensuring that
staying off game sites on company time where viruses can be downloaded,
forwarding chain emails, leaving workstation unattended or password sharing
over virtual mediums should be prohibited. With all these safety practices enforced,
it can be said that the safety of many users stored information of not becoming
a victim.

 

x

Hi!
I'm Shane!

Would you like to get a custom essay? How about receiving a customized one?

Check it out