logo

Security Measures Against Trojan Horse Malware at Samsung Company

Investigate and research an area of Computing and Information Technology (CIT) at the workplace by selecting an organization and analyzing its computer system and related activities.

6 Pages1259 Words61 Views
   

Added on  2023-06-03

About This Document

This article discusses the Trojan horse malware and its potential to cause damage to computer systems. It also provides preventive measures to ensure that Samsung Company's computer systems are free from malware. The article suggests using strong passwords, avoiding pirating materials, and installing antivirus software. Additionally, biometric devices like fingerprint and facial recognition can heighten security.

Security Measures Against Trojan Horse Malware at Samsung Company

Investigate and research an area of Computing and Information Technology (CIT) at the workplace by selecting an organization and analyzing its computer system and related activities.

   Added on 2023-06-03

ShareRelated Documents
Security at Samsung Company
Student’s name
Institution Affiliation
Security Measures Against Trojan Horse Malware at Samsung Company_1
Trojan horse
A trojan horse a malware that is disguised as legitimate software to cause damage to a computer
network or servers (Chakraborty 2017). It was developed by hackers to gain illegal access into a
targeted computer system and extract sensitive data. The virus is a programmed software that can
replicate in computer systems but they, however, don't replicate on themselves. They depend on
the end user of the computer to get installed into the system. It is programmed such that it tricks
the system users to be an innocent free download or an email attachment. It is however not
possible for the user to identify that the download program or the email attachment contains and
hidden programmed trojan virus. The virus attack is only noticed when the virus starts affecting
the computer system and its files.
When the users click on download the free program or email attachment, the trojan virus hidden
in the email attachment or the download is transferred to the user's computing device. Once it
gets inside the system, the attacker designer gain control over the system. The attacker can either
delete the data stored in the system, block the data transfer from the device to other users, modify
the already stored or even the data in transit and also make multiple copies of files within the
system.
Malware preventive measures
To ensure the computer system in Samsung company are free from any malware, it is essential to
consider the malware preventive measures. There are many preventive measures some of which
depend on a single user while others depend on the whole network under which various devices
operate. One of the best preventive measures is the user password setting (Crossler, Bélanger and
Ormond 2017). Within the company, there are any computers that connect and share files or
Security Measures Against Trojan Horse Malware at Samsung Company_2
internet through the Wi-Fi connection. Sharing of the files or network among the computers can
lead to malware infection thus affecting the system. It is therefore essential for the company to
ensure the network is secured with a strong password. Broadcasting an open Wi-Fi connection or
an SSID should be avoided as it endangers the security to the system. The password can also be
strengthened by the use of either WPA or the WPA2.
The second malware preventive measure is think before click (Joshi et al. 2018). Malware
viruses such as the trojan horse enter and infect computer systems through clicking. It is,
therefore, important for the computer users within the organization to avoid any websites with
pirating materials. It is recommended that the users should not open an email attachment from
any other company or an individual without aware of its source. It is vital to hover over a link on
the internet to see where the link directs before making a click on the URL. The file downloaded
from an FTP site, internet, file sharing service, an email or any other source should be scanned
first before being run in the computer. This helps in identifying and removing any virus that can
affect other files in the company’s system. Although a good antivirus does the work
automatically, it is also essential to ensure that the scanning has been done.
Malware attacks can also be prevented by installing antivirus or the malware software in the
computers. An antivirus is responsible for checking of the security status of the computer system
through scanning, and if any virus found, the malware removes it (Golshan et al. 2017). The
company IT staffs should not assume that the computers are always safe without antivirus
software installed. Any computer system is prone to malware attacks, and this can be exempted
by installing antivirus software as it keeps computer free from virus. With this software, it is an
important step to ensure that it is always updated. This makes the software stronger such that it
Security Measures Against Trojan Horse Malware at Samsung Company_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Risks and Risk Management
|11
|781
|13

Analyzing Security Options for JKL Company
|12
|841
|51

Understanding SQL Injection, Insider Attacks, and Malware Threats for Enhanced Cybersecurity
|7
|2711
|157

ISY2003 Information Security
|15
|2806
|80

Risk Assurance Management Assignment 2022
|3
|437
|11

Malware Analysis Assignment PDF
|29
|6377
|378