This document discusses backup strategies for data security, including file-based backup and incremental backup. It also explores the use of cloud backup strategies and their benefits. Additionally, it provides insights on how to protect yourself from spam activities and offers tips on identifying and reacting to spam messages.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: IT0 INFORMATION SECURITY
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IT1 1)The main objective of backing up data on the computer system or servers is to restore it at a time of lost or corrupted due to any sort of virus or Trojan attack(Brewer, 2016). There are many types of backup strategies where two significant strategies are detailed below – File-Based Backup/Full Data Backup – It is one of the most common backup technique which includes creation of replica of all the data into an external drive or disk. In this backup strategy, the data is back up within a single disk, however, it takes much time to do a complete backup with this strategy in comparison with others. IncrementalBackup–Thisbackuptechniqueisusedbypeoplewhere differences of data are backed up, which is dissimilar from the last backup. This also leads to an advantage for the user as it only copies small amount of data than full data backup and thus it is both time and cost efficient. Use of cloud backup strategies – To store or backup any data and information, cloud backup is preferred by many people as secure and safest platform (Harnik, Pinkas & Shulman- Peleg, 2010). It gives many extra benefits and security and provides user to access their data from anyplace in the world. It is also known by its other name i.e. online backup as it back up the information with the help of public network handled by many service providers. In case of any issue, cloud-based backup helps the users to get quick recovery of data at any time. Moreover, it is also backed by greater security regulations and measures. 2)Spam activities involve the use of false internet accounts to send inappropriate messages to a legitimate user. These sorts of messages are sent in big numbers consideringmanybasicintentionssuchasphishing,promotion,dispersionof malicious links, fake reviews, malware attacks and on-click baiting (Sanz, Hidalgo & Perez,2008).Tohelpconquertheseissues,severalsecuritytechniquesand mechanism can be used in order to be protected from these spam activities.
IT2 Look out for long range informal communication spam Span is rising continuously with the proceeding of pervasiveness of informal communication among all sorts of public (Calise, De Rosa & i Marin, 2010). New stage of social building methods makes it hard to identify honest or fraudulent emails. These bottlenecks in align with the trust amid long range informal communication associations allow spammers to attain more personal understandings in relation to their goals and hence, make more substantial damage. As per Cloudmark, a cyber-security firm reveals that around 34% of UK grown-up uncovered that they received SPAM emails connected with informal firms somehow. Considering spam messages, it is harder to differentiate conventional spam and emails (Delany, Buckley & Greene, 2012). Sometimes, informal companies are being misused by spammers in order to spread spam messages. Acknowledging all these things, you need to ensure that it is the individual you “become a close acquaintance with” on informal enterprises instead of just focusing on increasing a companion check. Know how to react legitimately It is important to consider whenever one noticed spam that not to react to them. As per reports by Cloudmark, it was found that all those who reacted to spam messages, 25% of them received more spams consequently. One can report the message to the hostile by tapping the message or labelling it as a spam message. In addition, one can also buy smart protection from an organisation which will caution the user if anyone is planning to take on fake exercise. Not to tap or join any message that is non-trustable In fraudster portfolio, spreading malignant messages becomes one of their important approaches. It is now very easy for them to hide the message they are sending with a main web-connect link that is needed to tap upon. Considering all things, tapping on the specific web link or message in the mail will go specifically to the website on the browser to run out the activity the email is requesting.
IT3 When done, one will be realized easily that whether it was an honest web link or phishing site that copy out malware on system. It is important to consider the comparable the alert for messages sent from respective email address in referring with client address book, as it looks more authentic. DO up-to-date all security programmes and other PC frameworks It is important to ensure that all system security programmes are getting regular update from their regular source. These include antivirus software, defenders, and internet security programmes (He, Chan & Guizani, 2015). It is also important to do most recent update of the system or platform on which all applications are running. This will help in fixing compatibility issue and also leading to prevent users from spam attack.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
IT4 References Brewer,R.(2016).Ransomwareattacks:detection,preventionandcure.Network Security,2016(9), 5-9. Calise, M., De Rosa, R., & i Marín, X. F. (2010). Electronic publishing, knowledge sharing andopenaccess:anewenvironmentforpoliticalscience.europeanpolitical science,9(1), S50-S60. Delany, S. J., Buckley, M., & Greene, D. (2012). SMS spam filtering: methods and data.Expert Systems with Applications,39(10), 9899-9908. Harnik, D., Pinkas, B., & Shulman-Peleg, A. (2010). Side channels in cloud services: Deduplication in cloud storage.IEEE Security & Privacy, (6), 40-47. He, D., Chan, S., & Guizani, M. (2015). Mobile application security: malware threats and defenses.IEEE Wireless Communications,22(1), 138-144. Sanz, E. P., Hidalgo, J. M. G., & Perez, J. C. C. (2008). Email spam filtering.Advances in computers,74(1), 45-114.