Saturday, March 5, 2022

Week 12 Posting - Genesis Perez

 Threats to the Computer

No one likes viruses. Everyone wants to keep their files and privacy intact and not on the risk of being exposed or destroyed. Back in the days when I wasn’t familiar with security programs and software, there were times where I’d encounter a virus and it would either slow down my computer or corrupt my files. However, after reading an article from Vangie Beal called “Computer Virus vs Worm vs Trojan Horse,” it changed my perspective on the different types of threats to an individual’s device. At first, I thought a worm or trojan horse was related to a virus but they’re simply not. It’s a common mistake today and there should be more of an awareness and differentiating the three threats. What is common knowledge is that these three damages and corrupts the computer in different angles.

A computer virus hangs onto a file or program and spreads itself to another, infecting computer to an extend unless treating it quickly. This may come in a form of emails and visiting NSFW websites. A worm is like a virus, but it spreads and travel without the user interacting with the device at all. Matter of fact, it sends copies or replicate of itself to the user’s entire network. A worm will consume a lot of bandwidth in a web server that it will stop responding. Lastly, a trojan horse is like a fake software that from the outside, it looks harmless, but once installed, it can either annoy the user by changing the users’ desktop interface or even deleting files off their system. Out of the three threats, the trojan horse is the trickiest and the most deceptive threat for the user’s device.

            According to Beal, a few useful tips are keeping the user’s operating system updated and to utilize a firewall (Beal, V., 2004).

References

Beal, V. (2004, October 28). Computer Virus Vs Worm Vs Trojan Horse. Webopedia. https://www.webopedia.com/insights/virus-vs-worm-trojan/

  • What did you find enjoyable or not about this assignment?
    • What I don’t find enjoyable is that I should’ve learned the differences between the threats in middle school or something. I feel like this is like beyond basic information that sadly, only know I learned this. I am not upset but it’s kind of funny.
  • Was it helpful to you in your current job?
    • It will be very helpful for me.
  • Can you see yourself Blogging in the future when it isn't required for an assignment?
    • I enjoy sharing ideas and personal experiences with topics that I admire and that I find interesting. Whether it’s gaming or technology, I will find time to blog in the future.
  • Can you see this ability as desirable for a company, giving you more weapons in your arsenal and making you a more attractive hire?
    • Cyber security is an important and useful career. I believe any company would love to hire a cyber security professional to keep their company safe and running smoothly.

 

No comments:

Post a Comment

Week 10 Posting - Cloud Automation

For the final week of class, we learned about cloud automation and using common terminology that are used in automation services and techniq...