Dangerous Computer Problems: [Essay Example], 754 words GradesFixer
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

exit-popup-print

Professional writers and researchers

exit-popup-quotes

Sources and citation are provided

exit-popup-clock

3 hour delivery

exit-popup-persone
close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Dangerous Computer Problems

Download Print

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

Hackers appear everywhere. It is a crime and when it happens it ought to be reported to the Federal Bureau of Investigation (information can be found at the website listed below). A hacker is a criminal who works at gaining access on personal computers to find and use private information on the computer user. Hackers often find weak spots in security systems in order to gain that access needed to get into the computer. In many cases, they install Trojan horses, programs meant to mislead the user of its true intention. Defend yourself against these hackers by keeping your software on laptops, PCs, phones, and other devices up-to-date. Use common sense and don’t open suspicious emails that could contain hackers. Make sure that passwords are strong; change them as often as possible. Also, install a firewall that can help inform you of incoming hackers. For more information look at the website www.ag.state.mn.us/consumer/publications/HowtoProtectYourselfAgainstHackers.asp.

Another dangerous computer problem is viruses. Viruses are what infect the initial computer and work at attacking others’ in the contact lists. Viruses are often found in the form of an email attachment or a download. When opened they attach themselves to hard drives and find their ways to be sent via email. Viruses can bring about unwanted ads, give away personal information, hijack web browsers, and send countless spam to those in contact lists. Results from viruses include constant computer crashes and programs running without the users approval. Protection against viruses can include simply reading the full user agreement that could suggest other suspicious downloads. Be alert to opening only trusted sources. www.umass.edu/it/support/security/protect-against-viruses-security-threats is a website that can help you discover ways to protect yourself.

Adware is the software displaying advertisements usually through pop-up windows. Similar to the previous ones, adware typically comes in through downloading of apps, media, or others. A website giving more information on adware is www.trendmicro.com/vinfo/us/security/definition/adware. More often adware is not inherently malicious, it’s considered grayware, software or a code that falls into the grey area between normal software and a virus. Adware can spy on your browser activity, stealing personal information, and selling it to people. A simple solution to defend against adware is by blocking popups. Spyware acts as a spy. It finds out personal information, records it and gives it away. It is often a result, again, from downloads sometimes with your authorization and other times are downloaded automatically. Spyware causes unwanted sites to pop up, it finds out your internet surfing habits, and what apps have been downloaded. Always be aware of the website and source the download is coming. www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx#s02 will give further information about spyware and the ways to protect from the dangers of spyware.

Vicious spyware, viruses, hackers, and more happen on even governmental computers and large companies. A recent attack that has left many puzzled by the large complication is known as Trisis, an outbreak on industrial control systems (ICS). The disaster happened in Saudi Arabia at an oil and gas facility. This complicated code forced the equipment to shut down, which was later to be revealed as an emergency protection reaction. After the equipment shut down, the company had to put a halt on its operations resulting in major financial loss. Even to this day much information is closed to the public and even more is left unsolved including the creator of the code. Reporters have stated that this virus is a brand new cyperweapon created for mass destruction. This is only the fifth malware to aim at ICS; previous ones included CrashOverride and the more famous one, Stuxnet. Trisis has the ability to malfunction the SIS , a controller managing equipment in an oil or gas facilities, paper mills, or nuclear power points. If Trisis has the ability to control the SIS controls some shocking effects could result in physical destruction or even life loss. After much investigation, a file was located called trilog.exe delivered from the technology supplier, Schneider Electric.

Further examination found that the legitimate looking file was created by someone outside the company with devastating malware attached. Knowledge is known of how the file found its way into this company, but FireEye will not release that information. The code is far more complicated and sources say that it could potentially take a year to finally fully diagnose. It is clear that attribution is lagging beyond where it ought to be. This continues to be a mystery unsolvable and stumping many people invested in cracking this case. For more detailed information please check out these websites www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html and www.cyberscoop.com/trisis-ics-malware-saudi-arabia/.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Cite this Essay

To export a reference to this article please select a referencing style below:

GradesFixer. (2019). Dangerous Computer Problems. Retrived from https://gradesfixer.com/free-essay-examples/dangerous-computer-problems/
GradesFixer. "Dangerous Computer Problems." GradesFixer, 03 Jan. 2019, https://gradesfixer.com/free-essay-examples/dangerous-computer-problems/
GradesFixer, 2019. Dangerous Computer Problems. [online] Available at: <https://gradesfixer.com/free-essay-examples/dangerous-computer-problems/> [Accessed 11 July 2020].
GradesFixer. Dangerous Computer Problems [Internet]. GradesFixer; 2019 [cited 2019 January 03]. Available from: https://gradesfixer.com/free-essay-examples/dangerous-computer-problems/
copy to clipboard
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

    close

    Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

    Recieve 100% plagiarism-Free paper just for 4.99$ on email
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample
    close

    Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you

    close

    Thanks!

    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now
    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

    GradesFixer.com uses cookies. By continuing we’ll assume you board with our cookie policy.