Bis 221 – Information Systems and SecurityInformation Systems and SecurityShraina SandersBIS/221April 4, 2015Jacquelyn NewsomInformation Systems and SecurityIn researching for this paper, I got a little more than I bargained for in just the 4th chapter alone. You would think you already know all this information, but I am slowly and truly finding out, that the more I know, the more I need to know. One thing is for sure, and that is, it is imperative that we protect ourselves and our personal information, especially within a business.There are 5 factors that can increase the vulnerability of information.The internetLess expensive computers and storage devices (netbooks flash drives ECT.)Non skilled hackers (now they can learn to do this on YouTube)Lack of managementOrganized cybercriminalsWe are now able to connect to the internet wirelessly, and independent of your office cubicle. When a person uses an open internet access, they are leaving themselves vulnerable to cybercriminals. The cheaper computers and smaller devices, also make it easier to steal and conceal information. There was a time when an individual, had to be super smart to be able to hack into a computer, but now you can just go on the internet and learn step by step. Lack of management means that someone didn’t do their due diligence and realize that protection was needed or, they just were not keeping abreast of what employees are doing.

When a business system compromised it can cost millions to come back form that hacking. One example was not long ago, Home Depot had an incident where customer’s personal information got out and they had to monitor credit for a year which cost a pretty penny.  The customer’s had to get new debit cards and some of their cards were used. I happened to be one of the victims. There are also very deliberate attacks on computers such as, software, theft, sabotage or vandalism just to name a few. A software attack usually is some type of virus, or malicious software. Criminals steal by using thumb drives for instance to steal information. Sabotage and vandalism is, when a group purposefully defaces an organizations website to damage their image or to attempt to make them conform to whatever the agenda is at that time. The software attacks come in the form of viruses, malicious software and things of that nature. This is dangerous because these things can literally wipe out a hard drive.

Malware, when it comes to cybersecurity of the internet, is just worse. One of the problems is, when a website is compromised it can be extremely difficult for anyone to hack the site in order to change your password. Security is much tougher in computers where the most basic security measures are in place. There is an ever increasing number of malware that, by definition, are capable of spreading. That’s why this tool should not be used by hackers as a means to do anything good. That’s my take. I didn’t think this one of my goals was, what I think it was was to help me figure out what I can do to get rid of the Malware in this situation. I’m always thinking about what I can do. I’ll just come up with a list of things to do. If it’s still a little fuzzy (if it is still a little fuzzy) then you can always get some things to fix out. If it isn’t a little fuzzy then don’t use the tool. It doesn’t give you the most power or the best technical skills, but it does give somebody.

Malware, when it comes to cyberattacks, is just worse. One of the problems is, when a website is compromised it can be extremely difficult for anyone to hack the site in order to change your password. Security is much tougher in computers where the most basic security measures are in place. There is an ever increasing number of malware that, by definition, are capable of spreading. That’s why this tool should not be used by hackers as a means to do anything good. That’s my take. I didn’t think this one of my goals was, what I think it was was to help me figure out what I can do to get rid of the Malware in this situation. I’m always thinking about what I can do. I’ll just come up with a list of things to do. If it’s still a little fuzzy (if it is still a little fuzzy) then you can always get some things to fix out. If it isn’t a little fuzzy then don’t use the tool. It doesn’t give you the most power or the best technical skills, but it does give somebody.

Malware, when it comes to cyberattacks, is just worse. One of the problems is, when a website is compromised it can be extremely difficult for anyone to hack the site in order to change your password. Security is much tougher in computers where the most basic security measures are in place. There is an ever increasing number of malware that, by definition, are capable of spreading. That’s why this tool should not be used by hackers as a means to do anything good. That’s my take.

Malware, when it comes to cyberattacks, is just worse. One of the problems is, when a website is compromised it can be extremely difficult for anyone to hack the site in order to change your password. Security is much tougher in computers where the most basic security measures are in place. There is an ever increasing number of malware that, by definition, are capable of spreading. That’s why this tool should not be used by hackers as a means to do anything good. That’s my take.

Malware, when it comes to cybersecurity of the internet, is just worse. One of the problems is, when a website is compromised it can be extremely difficult for anyone to hack the site in order to change your password. Security is much tougher in computers where the most basic security measures are in place. There is an ever increasing number of malware that, by definition, are capable of spreading. That’s why this tool should not be used by hackers as a means to do anything good. That’s my take. I didn’t think this one of my goals was, what I think it was was to help me figure out what I can do to get rid of the Malware in this situation. I’m always thinking about what I can do. I’ll just come up with a list of things to do. If it’s still a little fuzzy (if it is still a little fuzzy) then you can always get some things to fix out. If it isn’t a little fuzzy then don’t use the tool. It doesn’t give you the most power or the best technical skills, but it does give somebody.

Malware, when it comes to cyberattacks, is just worse. One of the problems is, when a website is compromised it can be extremely difficult for anyone to hack the site in order to change your password. Security is much tougher in computers where the most basic security measures are in place. There is an ever increasing number of malware that, by definition, are capable of spreading. That’s why this tool should not be used by hackers as a means to do anything good. That’s my take. I didn’t think this one of my goals was, what I think it was was to help me figure out what I can do to get rid of the Malware in this situation. I’m always thinking about what I can do. I’ll just come up with a list of things to do. If it’s still a little fuzzy (if it is still a little fuzzy) then you can always get some things to fix out. If it isn’t a little fuzzy then don’t use the tool. It doesn’t give you the most power or the best technical skills, but it does give somebody.

Malware, when it comes to cyberattacks, is just worse. One of the problems is, when a website is compromised it can be extremely difficult for anyone to hack the site in order to change your password. Security is much tougher in computers where the most basic security measures are in place. There is an ever increasing number of malware that, by definition, are capable of spreading. That’s why this tool should not be used by hackers as a means to do anything good. That’s my take.

Malware, when it comes to cyberattacks, is just worse. One of the problems is, when a website is compromised it can be extremely difficult for anyone to hack the site in order to change your password. Security is much tougher in computers where the most basic security measures are in place. There is an ever increasing number of malware that, by definition, are capable of spreading. That’s why this tool should not be used by hackers as a means to do anything good. That’s my take.

Get Your Essay