Categories
Technology

Describe the symptoms and damage that each breach can inflict after compromising a system.

To complete this assignment, you will explain the importance of information and system security for individuals and organizations.
As a part of the Week 3 Traveling Through a Network discussion forum, you used ping commands to become familiar with networking. Explain the type of attack(s) that can be executed using ping commands.
In addition, select two of the following computer security incidents to discuss in more detail:
Security holes/vulnerabilities
Computer viruses
Email spam
Phishing
Password cracking
Social engineering
In your paper
Explain why computer systems are vulnerable to each kind of threat.
Describe the symptoms and damage that each breach can inflict after compromising a system.
Propose at least two recommendations for protecting a computer system or network from each type of security breach.
Support your statements with evidence from your sources.

Leave a Reply

Your email address will not be published. Required fields are marked *