Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
MSIT - 11788135
Prof. Cecille Genuino
Cyber Security
In a realm compelled with humongous amount of data and information generally managed by
internet and supervised under IT systems, information safety, and data confidentiality are
constantly in danger. As the technology arising the same goes through with cybercrime
mechanisms and techniques are constantly evolving which heightened the degree of catastrophe
to the victims. Ashford (2012) and Bendovschi (2015) articulated that attackers are advancing
approaches to acquire access to computer networks, programs, and data of an organization they
are wishing to be compromised. Each year, there are records of massive attacks to large
companies which affects the business data integrity and customers trust (Morgan, 2017). On the
12th day of May 2017 was the most fatal cyber-attack in the Internet chronicle. The ransomwares
called WannaCry and Petya exploits took the advantage of the security breach of Windows
operating system. Within an hour after it was released, 200,000 computers were infected and
mostly were from Europe (Zaharia, 2017). Most of the victims were organizations because of its
capacity to gamut over computer networks without human interaction. These organizations who
were infected by ransomwares will be restricted from their access to organizations file or lock the
machine to thwart user from usage (Kansagra, Malaram & Jha, 2015). The attackers will take
over the ownership of the files and will only be hand down to the owner if they paid the required
amount asked by these cyber criminals (Symantec, 2017). Arvina et al. (2017) published a
Microsoft Security Intelligence Report (SIR) on software susceptibility, exploits and malwares.
The report stressed that cyber-attacks recorded from last year has increased to over 300 percent.
Although cyber-attack is a challenge faced by many businesses and organizations, there are
actions they can use to help lessen the risks by using malicious software removal tools, applying
operating system and servers. Instead, there are only strategies or actions to take to lessen the
Malicious Software Removal Tool (MSFT). According to Microsoft support and Arvina et al. (2017)
the current version of this software can gather and disclose the real-time security status of a
machine. This tool is liable of detecting and eradication of rampant threats and nullify the
modification made by these threats. As of March 2017, SIR also noted that 75 percent of machines
worldwide are protected with MSFT toll mitigating from these potential risks made by these cyber
criminals.
Secondly, keep your device or computer updated. The basis why computers exposed to exploits
are due to software security platform used. Security specialists firmly suggests updating current
operating system on a systematic basis (Get Manual Updates, n.d.). Old operating system is
vulnerable to threats such as Windows XP because its discontinued support for software updates
and security fixes. Conceivably, this means that cyber attackers could target and infect the XP
machine (Ludlow, 2014). Therefore, experts are advising to turn on automatic update on the
software settings. Current security updates, patches, and drivers will ensure to keep your machine
free from breaches and other security rifts. Additionally, theses updates are fixing the conundrum
Thirdly, a computer machine should install reliable anti-virus software. Installing anti-virus
software insulates the machine from computer viruses that can shatter system and user data,
decelerating performance of device. Anti-virus works by scanning and analyzing the bits of code
of the file which then compared into the database. If the file emulates the existing, it will
automatically detect as virus and move to quarantine or delete the file (Comodo, 2017).
Furthermore, the Independent IT-Security Institute (2017) put the antivirus into test to test its
protection, performance, and usability to a Windows 10 64-bit operating system. The result
showed a strong evidence this antivirus software is reliable enough to protect from the computer
viruses.
Lastly, enabled firewall security software program. Fundamentally, a firewall can afford security
from intrusive eyes. Computer firewall has three components: computer, firewall, and internet. It
screens out hackers, viruses, and worms that attempt to contact your machine over internet
(Safety Security Center, n.d.). Additionally, firewall also prohibit private data from being sent out
from without the owners permission (Firewall, Internet Security, Anti-Virus Protection -
BullGuard, n.d.).
In conclusion, as the technology advances, the tools and techniques used by cyber intruders are
also improving. These scenario is inevitable, and the author found out that there is no single
solution to stop these activities of cyber criminals. But with the suggested precautionary
procedures mitigates perils from cyber-attacks. Personal computer, servers and data can be
protected by using Malicious Software Removal Tool (MSFT), utilizing the advantage of Antivirus
software, enabling network firewall, and keeping up-to-date operating system and software.
Among all the named preventive actions, the most important thing to note is to keep everything
Ashford, W. (2012). Powerful cyber-attack tools widely available, say researchers. Retrieved from
http://www.computerweekly.com/news/2240162578/Powerful-cyber-attack-tools-widely-
available-say-researchers
Avena, E., capriotti, R., Dong, Z., Douglas, E., Duncan, M., Fender, S., Yim, J. (2017). Staying
sharp on security. Microsoft Security Intelligence Report, 22, 1-75. Retrieved from
https://www.microsoft.com/en-us/security/intelligence-report
AVTest. (2017). The best antivirus software for Windows Home User. Retrieved from
https://www.av-test.org/en/antivirus/home-windows/windows-10/october-2017/ahnlab-v3-
internet-security-9.0-174050/
Ludlow, D. (2 June 2014). When Windows XP support ends, this is how you secure your PC and
save all updates. Retrieved from www.expertreviews.co.uk/software/8090/when-
windows-xp-support-ends-this-is-how-you-secure-your-pc-and-save-all-updates
Security Response Team. (2017, May 23). What You Need to know about the WannaCry
Ransomware. Retrieved from https://www.symantec.com/blogs/threat-
intelligence/wannacry-ransomware-attack
Xavier Becerra. (n.d.). Protect Your Computer from Viruses, Hackers, and Spies. Retrieved from
https://oag.ca.gov/privacy/facts/online-privacy/protect-your-computer
Zaharia, A. (2017). What Is Ransomware And 15 Easy Steps to Keep Your System
Protected. Retrieved from https://heimdalsecurity.com/blog/what-is-ransomware-
protection/