Individuals need information security to protect their important personal information from being stolen. They need system security to prevent harmful cyber attacks that hurt application programming or operating systems. There are many ways that your information and system security can be threatened and also many ways to protect it.
Malware is malicious software that runs on a computer causes it to do harmful things like running services that charge you or messing up your data. Ransomware is a type of malware that steals data and holds it requiring you to meet specific terms to regain access.
It is important to regularly scan your computer for any malware. There may be important updates that patch any vulnerabilities. It is also smart to have back up data and being prepared in case of malware infection. One of the best ways to keep your information secure is through the use of antivirus software.
“It primarily works by using a list of known virus patterns, called definitions or signatures. Another way it works is through heuristic identification. This means the software looks for actions or behaviors that are similar to what viruses do and tries to block those actions.” (TestOut Corp., 2024)
Infections can spread through a network and onto different devices so it is important to activelymonitor across different devices on the network. Some other great ways to prevent a malware infection are “filtering to only allow file types you would expect to receive blocking websites that are known to be malicious, actively inspecting content, and using signatures to block known malicious code”. (NCSC,2020) Disconnecting from the internet may also be necessary in the case of a malware infection.
Social engineering refers to when someone manipulates another to get sensitive information by masquerading as something that they aren’t. There are different types of social engineering like phishing, baiting, tailgating, scareware, and dumpster diving. Some use hardware to transmit malware others use schemes like false alarms. Tailgating is “a physical breach where an unauthorized person manipulates their way into a restricted or employee only authorized area through the use of social engineering tactics.”(CMU, n.d) Multi-factor authentication is a great preventative measure that helps to ensure the wrong person isn’t trying to access your information. It’s important to safely guard sensitive files and verify any outside sources asking for that information.
Awareness of what information should be securely guarded and who to allow access to that information is key. Antivirus software and safe communication practices, as well as routine monitoring of the activity in your network are essential for maintaining the security of your information and system.
References
Mitigating malware and ransomware attacks. (02/2020) https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks
Carnegie Mellon University. (n.d.). Social Engineering - Information Security Office - Computing Services - Carnegie Mellon University. https://www.cmu.edu/iso/aware/dont-take-the-bait/social-engineering.html
TestOut Corp. (2024). CertMaster Learn Tech+. http://www.testout.com
Comments
Post a Comment