Submitted by: Submitted by jgreaves
Views: 10
Words: 1848
Pages: 8
Category: Science and Technology
Date Submitted: 05/05/2016 08:53 AM
Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system.
This assignment requires two to three pages in length, based upon the APA style of writing.
Today many people go to bed at nights thinking that their sensitive digital information/life is secure, ‘why would anyone target me, I have nothing for anyone to gain off of’ are their words of comfort. As they remain blind to the fact that, there are lots of useful informational that a third party may obtain from a personal computer that the user may not even realize (Barrett, 2009). If an attacker was to obtain personal finical information or even life secrets about that person, they would have increased their potential for a successful hack. Such Information can be used by attackers to monitor their victims internet activities, regardless if they are logged in their personal computer whether at a local network, or on the internet. The victim’s sensitive information can be shared over the internet, or sold to third-parties such as advertisers and criminals among others. In the effort to educate, this paper aim to highlight the potential security risks on private/personal computer and some of the techniques an attacker might employ to access information on the system.
For many attackers they too are fighting a war and in hopes of success, as a result they create techniques that can launch and execute unexpected deadly attacks. “Attack where your enemies are not prepared; go to where they do not expect.” (Sun Tzu) Operating in such mindset, defending IT infrastructure involves understanding attack tactics that are particularly effective to date. Understanding the following characteristics of modern computer security threats such as social...