Network Security


Computer systems are vulnerable to each kind of threat due to software and hardware designed flaws. The lack in these areas expose the computers to all sorts of threats. Technology advancement  is continuous due to the world's dependability on technology. There are a lot more vulnerabilities stored in computers such as having weak passwords, and failing to update firewalls to protect the device. All in all, software is coded by humans and no one writes software completely free of errors that create openings for potential attackers.

 In regards to symptoms and damage a breach inflicts after infiltrating a system, it is important to note the many different types. In cybersecurity, there are complex and information breaches. Missing records, peculiar network travel and file changes are telltale signs of a data point breach. This type of breach can have a direct harm on the business’ reputation, privacy and product, as well as the consumer’s security. Nevertheless, after compromising a computer system they will experience a lot of unexpected things such as loss of storage and poor performance. A compromised computer is defined as any computing resource whose confidentiality has been adversely impacted, either intentionally or unintentionally, by an untrusted source. This can lead to limited disk space, frequent pop ups and mass emails being sent from your personal account. 

One recommendation that I have for protecting a computer system is by having the firewall automatically update. In the article ``What are the Advantages of Next Generation Firewall Over Traditional Firewall?” by Debra Bruce,  it explains that the firewall provides protective layers to help prevent attack. This is a way to consistently protect your information by having the update of the firewall automatically. Another recommendation that I have is using an email detection tool. This tool takes away all spam emails and Prevent bounces and preserve the sender's reputation Samarthrao, K. V., & Rohokale, V. M. (2021). As I said up above with technology there is always the possibility of breach. These recommendations are not costly and will help protect breaches and maintain cyber security of the devices. 


 

Comments

Popular posts from this blog

Tech Topic Connections