Anda di halaman 1dari 4

Nelson G. Balneg Jr.

MSIT - 11788135
Prof. Cecille Genuino

Cyber Security

In a realm compelled with humongous amount of data and information generally managed by

internet and supervised under IT systems, information safety, and data confidentiality are

constantly in danger. As the technology arising the same goes through with cybercrime

mechanisms and techniques are constantly evolving which heightened the degree of catastrophe

to the victims. Ashford (2012) and Bendovschi (2015) articulated that attackers are advancing

approaches to acquire access to computer networks, programs, and data of an organization they

are wishing to be compromised. Each year, there are records of massive attacks to large

companies which affects the business data integrity and customers trust (Morgan, 2017). On the

12th day of May 2017 was the most fatal cyber-attack in the Internet chronicle. The ransomwares

called WannaCry and Petya exploits took the advantage of the security breach of Windows

operating system. Within an hour after it was released, 200,000 computers were infected and

mostly were from Europe (Zaharia, 2017). Most of the victims were organizations because of its

capacity to gamut over computer networks without human interaction. These organizations who

were infected by ransomwares will be restricted from their access to organizations file or lock the

machine to thwart user from usage (Kansagra, Malaram & Jha, 2015). The attackers will take

over the ownership of the files and will only be hand down to the owner if they paid the required

amount asked by these cyber criminals (Symantec, 2017). Arvina et al. (2017) published a

Microsoft Security Intelligence Report (SIR) on software susceptibility, exploits and malwares.

The report stressed that cyber-attacks recorded from last year has increased to over 300 percent.

Although cyber-attack is a challenge faced by many businesses and organizations, there are

actions they can use to help lessen the risks by using malicious software removal tools, applying

update patches, antivirus software and firewalls.


Experts noted that there is no single solution securing your machine running on windows

operating system and servers. Instead, there are only strategies or actions to take to lessen the

menace of cyber-attacks. Firstly, a personal computers or computer servers should install

Malicious Software Removal Tool (MSFT). According to Microsoft support and Arvina et al. (2017)

the current version of this software can gather and disclose the real-time security status of a

machine. This tool is liable of detecting and eradication of rampant threats and nullify the

modification made by these threats. As of March 2017, SIR also noted that 75 percent of machines

worldwide are protected with MSFT toll mitigating from these potential risks made by these cyber

criminals.

Secondly, keep your device or computer updated. The basis why computers exposed to exploits

are due to software security platform used. Security specialists firmly suggests updating current

operating system on a systematic basis (Get Manual Updates, n.d.). Old operating system is

vulnerable to threats such as Windows XP because its discontinued support for software updates

and security fixes. Conceivably, this means that cyber attackers could target and infect the XP

machine (Ludlow, 2014). Therefore, experts are advising to turn on automatic update on the

software settings. Current security updates, patches, and drivers will ensure to keep your machine

free from breaches and other security rifts. Additionally, theses updates are fixing the conundrum

of basic programs runs on the computer.

Thirdly, a computer machine should install reliable anti-virus software. Installing anti-virus

software insulates the machine from computer viruses that can shatter system and user data,

decelerating performance of device. Anti-virus works by scanning and analyzing the bits of code

of the file which then compared into the database. If the file emulates the existing, it will

automatically detect as virus and move to quarantine or delete the file (Comodo, 2017).

Furthermore, the Independent IT-Security Institute (2017) put the antivirus into test to test its

protection, performance, and usability to a Windows 10 64-bit operating system. The result
showed a strong evidence this antivirus software is reliable enough to protect from the computer

viruses.

Lastly, enabled firewall security software program. Fundamentally, a firewall can afford security

from intrusive eyes. Computer firewall has three components: computer, firewall, and internet. It

screens out hackers, viruses, and worms that attempt to contact your machine over internet

(Safety Security Center, n.d.). Additionally, firewall also prohibit private data from being sent out

from without the owners permission (Firewall, Internet Security, Anti-Virus Protection -

BullGuard, n.d.).

In conclusion, as the technology advances, the tools and techniques used by cyber intruders are

also improving. These scenario is inevitable, and the author found out that there is no single

solution to stop these activities of cyber criminals. But with the suggested precautionary

procedures mitigates perils from cyber-attacks. Personal computer, servers and data can be

protected by using Malicious Software Removal Tool (MSFT), utilizing the advantage of Antivirus

software, enabling network firewall, and keeping up-to-date operating system and software.

Among all the named preventive actions, the most important thing to note is to keep everything

updated. As what the saying goes, prevention is better than cure.


References

Ashford, W. (2012). Powerful cyber-attack tools widely available, say researchers. Retrieved from
http://www.computerweekly.com/news/2240162578/Powerful-cyber-attack-tools-widely-
available-say-researchers

Avena, E., capriotti, R., Dong, Z., Douglas, E., Duncan, M., Fender, S., Yim, J. (2017). Staying
sharp on security. Microsoft Security Intelligence Report, 22, 1-75. Retrieved from
https://www.microsoft.com/en-us/security/intelligence-report

AVTest. (2017). The best antivirus software for Windows Home User. Retrieved from
https://www.av-test.org/en/antivirus/home-windows/windows-10/october-2017/ahnlab-v3-
internet-security-9.0-174050/

Bendovschi, A. (2015). Cyber-Attacks Trends, Patterns and Security Countermeasures, In


Procedia Economics and Finance. Procedia Economic and Finance, 28, 24-31.
https://doi.org/10.1016/S2212-5671(15)01077-1

Comodo. (2017). How Antivirus Works? Retrieved from


https://antivirus.comodo.com/how-antivirus-software-works.php

Ludlow, D. (2 June 2014). When Windows XP support ends, this is how you secure your PC and
save all updates. Retrieved from www.expertreviews.co.uk/software/8090/when-
windows-xp-support-ends-this-is-how-you-secure-your-pc-and-save-all-updates

Morgan, S. (2017). Cybersecurity Business Report. Retrieved from


https://www.csoonline.com/article/3153707/security/top-5-cybersecurity-facts-figures-
and-statistics-for-2017.html

Safety and Security Center. (n.d.). What is a firewall? Retrieved from


https://www.microsoft.com/en-us/safety/pc-security/firewalls-whatis.aspx

Security Response Team. (2017, May 23). What You Need to know about the WannaCry
Ransomware. Retrieved from https://www.symantec.com/blogs/threat-
intelligence/wannacry-ransomware-attack

UMassAmherst. (n.d.). Keep Your Computer's Operating System Up-to-Date (Windows).


Retrieved from https://www.umass.edu/it/support/security/keep-your-computers-
operating-system-up-date-windows/

Xavier Becerra. (n.d.). Protect Your Computer from Viruses, Hackers, and Spies. Retrieved from
https://oag.ca.gov/privacy/facts/online-privacy/protect-your-computer

Zaharia, A. (2017). What Is Ransomware And 15 Easy Steps to Keep Your System
Protected. Retrieved from https://heimdalsecurity.com/blog/what-is-ransomware-
protection/

Anda mungkin juga menyukai