logo

Securing the Enterprise Infrastructure Report 2022

Provide an example of a malicious attacker and how an authorized user can be a threat to system security. Discuss whether malicious attackers or authorized users are more of a threat to computer security.

4 Pages772 Words15 Views
   

Added on  2022-08-26

Securing the Enterprise Infrastructure Report 2022

Provide an example of a malicious attacker and how an authorized user can be a threat to system security. Discuss whether malicious attackers or authorized users are more of a threat to computer security.

   Added on 2022-08-26

ShareRelated Documents
IT 0
Securing the enterprise
infrastructure
Securing the Enterprise Infrastructure Report 2022_1
IT 1
Discussion forum
Hardening
Hardening is a kind of approach which is used in computing networks
for securing and protecting networks and information from hackers. It has
the capability to identify and manage unauthorized access or vulnerabilities
that occurred in the computing devices and lead security of a system.
Numerous kinds of methods involved in the hardening for securing
computing systems such as UNIX and Linux networks. Using such kinds of
systems companies are capable to determine the fraud signals transferred
by the attackers and enhance the level of security while using computer
systems. It helps to implement effective mitigation controls by which the
level of security can be enhanced.
Example of a malicious attacker
Spyware is an example of a malicious attack that has the capability to
obtain information about the business communities without taking their
permissions. Pathak, Pawar, & Patil, (2015) reported that spyware is a
malicious based attack which infiltrates computing devices used by the
individuals and gather sensitive data by transfer spam and fraud signals to
the main networks. It is a major cyber-attack faced by the business
communities and helps criminals to obtain personal information including
address, profile, login credentials, credit or debit card details and many
more.
From recent studies, it is highlighted that around 978 million
consumers in 20 regions were suffered by the spyware kind of malicious
attack in 2017 and most of the hackers transfer unauthorized signals to the
computer devices and obtain login credentials for gathering personal
information (Akhil, Nair, & Arun, 2014). It is found that an authorized
consumer can be a threat to system security as it helps to reduce the
Securing the Enterprise Infrastructure Report 2022_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Article 2022
|5
|1172
|24

Assignment on Cyber Defense in Web Based Attacks
|7
|1418
|22

Information Technology | Question and Answer
|6
|1038
|15

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Analytical Technology Reading and Writing
|5
|594
|18

Software and Operating System Security
|7
|1443
|21