Surveillance · Anti-Virus Password Breaches This is where

Surveillance ·         This is amajor problem with computer security in today’s world. It is the ability toturn on your phone’ microphone, laptop’s camera, smart TV’s microphone, etc. ·        One recent example was when the N.

S.A. inAmerica was leaked to have the ability to do these things and do carry outthese things in the name of counter terrorism. ·        Another example of a government body obtainingprivate information is when the F.B.I.

asked apple for a back door to a phone.This would have allowed the F.B.I. or any other organisation (includingscammers and hackers) to easily get into any iPhone. When Apple declined, theF.B.

I. said they hacked into it on their own. This calls into question if weshould trust these organisations.·        This can be found in Ireland when the Gardaítapped phones of innocent members of the public they confused with criminals orit was put on the wrong people.To prevent some threats·        Usestrong passwords, the best password are long passwords.·        Changepasswords periodically·        Usedifferent passwords for different sites·        Forextra security: use multi-factor authentication methods ·        Malware/Virus/Worms/The recent Ransomware·        DOS/DDOS·        Anti-VirusPasswordBreachesThis iswhere a password sever is breached and a hacker has the passwords.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

For thesehackers it is a race against time before the company goes public, adjust security.Most password severs had protection methods.·        Passwordsare stored hashed. This is where the password is turned into a random string ofletters, with an algorithm, but they can’t be turned back into their originalform. This method is still easy to break. Hackers can try many commonly usedpasswords, like qwerty and password123, until one matches the hash they have.Computers can do this very fast by using rainbow tables, which are a load ofhashes and their matching passwords.

The longer the password is the longer ittakes to break.·        Serversalso salt their hashes. This means adding a random bunch of letters to the hashat a certain point of it. This increases the time it takes to hack thepasswords.·        Quantum Computer’s will be able to hack intoencryptions with ease. An examplewould be the recent American breach with Equifax. This is a massive breach.

“You’retalking about a good portion of U.S. adults,” Hiep Dang, director of ProductManagement at Cylance and former leader of McAfee’s threat team, told FOX Business.

“Conservatively, maybe 75% aggressively, probably all of us.”They are a credit reporting agency, they keep tract ofeveryone’ financial history. They keep tract of every loan, bill Americans pay,Social Security and driver’s license numbers, credit card information, etc. Allof this info has been leaked.

This allows the hackers nearly to be you, to openbank accounts or even buy a house in your name. Equifax waitedsix weeks before they announced this, which gave the hackers time to begin usingthis data, without people knowing they have been hacked and checking theiraccounts. The only good news is that there is so many people with their datataken that the hackers can only use so much of the information.

Social EngineeringThis is where a hacker/spammer trys to tricks you. This cancome in multiple forms. ·        One form is ads on pages to try to get you toclick onto their site. These can add cookies to your computer. Which can trackwhat you type, see what websites you visit, etc. Another is downloading malwareinto your computer, which have even more access to your computer.·         Spamemails are another form of tricking you.

They can be non-legitimate businessoffers, which make you enter some bank details. Some are Trojans horses which you download a photo andwith it is malware. ·        Phishing is some action by the user to trigger amalicious behaviour·        Another way to trick someone is to set up a fakeWAP (wireless access point). They advertise a public Wi-Fi and data sniffunprotected data from the data streams sent between the unwitting victims andtheir intended remote hosts. Also they make you sign into the Wi-Fi to make yougive a password you usually use for other sites.