This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Security

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Security

 Cases of computers being hacked are not new; almost every day, there is a unique case of computer compromise around your neighborhood, especially if you have reliable internet access. I never used to take computer hacking incidences so thoughtfully until a close friend’s computer was hacked and her files stolen and other critical data deleted.

On a regular day, while enjoying coffee at a local café, a middle-aged man came to our table and requested her to send her the latest version of Metatrader, an app she was using. Without hesitation to help, she plugged the stranger’s flash drive to her computer and copied the app to the flash drive, after which the man left to his table and later left the café.

Later during the evening, Lisa, my friend, called me and complained that she was unable to access her files. There was a prompt demanding payment of five Bitcoins, failure to which her private data and photos would be shared publicly or deleted. Upon realizing this, Lisa hurriedly proceeded to create a bitcoin wallet deposited money amounting to the stated amount and paid the ransom. However, even after spending, she found some of her files missing. A ransomware attack had infected Lisa’s computer.

Upon reviewing Lisa’s case, it is easier to point out why the attack was so easy to execute. First, User confusion.  Lisa did not realize plugging a stranger’s USB drive could cause a security breach to her computer. Besides, the attacker seemed to have detected weakness in humans helping others, especially when danger cannot be easily recognized. Additional factors such as  Speed of malicious ransomware transfer and weak security update distribution made it easier to install ransomware without detection by the antivirus software.

To fix the computer, the entire operating system was uninstalled, and a new secure version was installed after which, a deep virus scan was performed.

Lisa’s case was preventable; however, humans are the weakest link in computer security. Lisa’s empathetic emotions could not allow her to deny plugging the external device to her computer to help the stranger. It is critical not to connect unknown user’s devices to your computer. Moreover, additional security measures could have prevented the attack; for instance, she could have scanned the USB drive before sharing files. If she could have done this, she would have been able to confront the hacker and prevent the ransom.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask