Malware And Hacking Attacks Research Paper

PAGES
2
WORDS
586
Cite

Asset Descriptions Computer Server

A computer server is basically a fancier computer that serves as a centralized point for one or more functions that are used by one or more workstations, commonly referred to as clients. Servers can be used as launch points for applications, as a place to store files and so forth. For example, a Citrix server could be set up so as to allow people to use their "2nd Desktop" web portal. This allows people to log into the server and use applications online even without the program files and so forth being on the local workstation that is using the program (Citrix, 2015).

Personnel Files

Personnel files are those that relate to the employment records of an employee. Examples of personnel records could and would commonly include I-9 forms, W-4 forms, W-2/W-3 forms, performance reviews, any records of disciplinary action, job applications, wage and compensation information and so forth. Particular data points that are worth mentioning are Social Security numbers, full name, home address, prior employment information, date of hire and so forth. These files could be in printed/paper form or they could be entirely digital. Other times, forms start off as paper-based but are scanned into...

...

Malware is a danger because it can get onto computer workstations and/or servers quite easily. Whether it be phishing attacks through email, going to the wrong website, downloading the wrong file and so on, malware can make its way where people do not want it. The results of this malware, depending on what is "contracted," would be data theft, data destruction, simple annoyance and/or pranking and the like. In short, there is almost surely going to be some sort of loss of time/productivity and perhaps data as well. Hacking is much the same thing except that it is a direct attack by a live person, an automated computer or a slew of them working together (MIT, 2015).
Personnel Files

When it comes to malware and hacking, personnel files are especially precious and important to protect, and for a number of reasons. First, many of the forms and documents on hand (e.g. I-9, W-4, W-2, etc.) have to be retained and kept for compliance reasons. Second, if the data is stole (either by an automated…

Sources Used in Documents:

References

Citrix. (2015). Leader in mobility, virtualization, networking and cloud services - Citrix. Citrix.com. Retrieved 13 December 2015, from http://citrix.com

MIT. (2015). Viruses, Spyware, and Malware. Information Systems & Technology. Retrieved 13 December 2015, from https://ist.mit.edu/security/malware

SHRM. (2015). Personnel Records: What should, and should not, be included in the personnel file?. Shrm.org. Retrieved 13 December 2015, from http://www.shrm.org/templatestools/hrqa/pages/includedinpersonnelfile.aspx

Zengerle, P. (2015). Millions more Americans hit by government personnel data hack. Reuters. Retrieved 13 December 2015, from http://www.reuters.com/article/us-cybersecurity-usa-idUSKCN0PJ2M420150709


Cite this Document:

"Malware And Hacking Attacks" (2015, December 13) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/malware-and-hacking-attacks-2159351

"Malware And Hacking Attacks" 13 December 2015. Web.24 April. 2024. <
https://www.paperdue.com/essay/malware-and-hacking-attacks-2159351>

"Malware And Hacking Attacks", 13 December 2015, Accessed.24 April. 2024,
https://www.paperdue.com/essay/malware-and-hacking-attacks-2159351

Related Documents

Sony Reels From Multiple Hacker Attacks In the past, many organizations - from Sony to NASA to the New York Times - have fallen victim to hacking incidents. In addition to costing organizations money, data breaches have also taken a significant toll on the trust customers have on affected businesses. It is therefore important to note that as entities continue to accumulate more PII of clients, the relevance of having in

However, nothing can be done until the malware actually occurs. With all the different viruses, worms and Trojans, how can security managers possibly predict what malware will occur next? In contrast, a behavioral rule defines legitimate activity in a system. Any activity not matching the profile will cause the security product to be triggered. As rules are not specific to a particular type of attack, they can block malicious

Hacker Culture and Mitigation in the International Systems The explosion of the internet technology in the contemporary business and IT environments has assisted more than 300 million computer users to be connected through a maze of internet networks. Moreover, the network connectivity has facilitated the speed of communication among businesses and individuals. (Hampton, 2012). Despite the benefits associated with the internet and network technologies, the new technologies have opened the chance

Malware Attacks the Democratic Process Once upon a time, a candidate had to excel at kissing babies and stump speeches. These were the major ways in which the candidate got his -- or much less frequently her -- image out to voters. All that the candidate's staff had to do as to ensure that reporters and photographers showed up at the right time to capture the choreographed images. The world of

Defeating the Threat of Malware Throughout history, humans have constructed walls, palisades, moats and other barriers as defenses against malicious attacks, but invaders have also responded with improved technologies that can defeat these defenses. Just as medieval defenders built their walls higher and their moats deeper, software developers today also seek to create products that are safe from unauthorized intrusion through firewalls and other security measures while hackers and other criminal

Iranian Hackers�Google Uncovers Tool Used by Iranian Hackers to Steal Data from Email Accounts�https://thehackernews.com/2022/08/google-uncovers-tool-used-by-iranian.htmlIn December 2021, Google alerted end-users with Gmail, Yahoo! and Outlook accounts that an Iranian-backed group known as Charming Kitten had used malware HYPERSCRAPE to hack accounts and retrieve user information. The threat is significant because it allows the Iranian group to eavesdrop and obtain sensitive data for the Iranian government. End-users need to re-secure their accounts