Introduction to Cyber Security (Part 2)
Most users do not install recent updates on their laptops and desktops. These updates they fail to install
puts such computer systems at risk. Installing updates helps protect your computer system. It provides
your computer system with up-to-date security features that will keep you (the user) protected. This is
also applicable to other softwares (antivirus software inclusive).
During the installation of some softwares (e.g. games, etc.) on our devices, we are required to put OFF
the firewall of the device. This can be harmful if the user is not sure of the software that is been
installed.
Transfer of files (videos, audios, texts, images, softwares, etc.) using external storage devices (e.g. Hard
disk drives, Flash drives) without knowing the state of such drives can be a threat to the information
security of any user. Also, visiting unsecure sights can be dangerous. Such unsecure websites may
include pornographic sites, free download sites (e.g. torrent), etc.
Forms of Attack
Attacks come indifferent forms. The most known form of attack is the virus. Some Forms include:
Malwares; refer to the generic term for all malicious softwares.
Viruses; malicious computer programs that can spread to other files.
Worms; replicate themselves across computer on a network and the internet.
Trojans; are malicious programs pretending to be legitimate softwares.
Ad wares; are softwares that display advertisements on device(s).
Spywares; permit advertisers and hackers to get sensitive information without users’
permission.
Rootkits; are softwares that hide programs and processes running on a computer.
Ransomwares; deny access to files until user(s) pay ransom.