Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Make a presentation about Causes of Computer Information Security Breaches Technology has improved over the recent past through the efforts of technology experts who are

Make a presentation about Causes of Computer Information Security Breaches

Technology has improved over the recent past through the efforts of technology experts who are interested in making the world of technology better every day. The fact has led to the development of many technology machines, and the computers have led to the improvement of the operations of many companies. However, the computers are affected by information security issues which need to be addressed. The following are causes of security breaches in the world.

The installation of malicious software, when using a computer through the internet, there are many times when this malicious software pops out from your searching site. In many cases when malicious software is installed on your computer, it is because you were tricked into downloading it. The hackers plant the malware in software and then place the software on a website. A user is however informed that they need to download the software for the site to load correctly. It is recommended that for security reasons, you should not download any software from the internet without the explicit consent of their functioning.

Hackers alter the operating system settings. Mainly, many users are logged into their computers as admits. As an administrator, one can change any settings, manage other accounts and even install programs. However, if a hacker manages to get the access to your laptop when you are set up as the admin, they will have the full access to the computer. The act means that they can install the malicious software and gain the full access of information of any company. For the avoidance of this problem, prevent administrator access and installing the security software like the anti-virus which scans your computer and keeps them up to date helps in reducing the chances of being infected.

A hacker compromises your password. Passwords remain the main ways to verify accounts and systems. When the pirate gets the username, and you have a weak password, then it takes them some little time to gain access to the account and however, they will have access to your information. For the prevention of this breach of information, it is strongly recommended to use robust passwords and different passwords for different accounts?

Step by Step Solution

3.48 Rating (148 Votes )

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Consumer Behavior Building Marketing Strategy

Authors: Delbert Hawkins, David Mothersbaugh

12th edition

978-0073530048, 73530042, 77645553, 978-0077645557

More Books

Students also viewed these Databases questions

Question

Make a presentation about the Smart phone war

Answered: 1 week ago