Skip to main content

Information and System Security


Importance of Information and System Security

Information and system security are essential for both individuals and organizations as they protect sensitive data, uphold trust, and ensure business continuity.

For individuals, information security helps protect and safeguard personal data. It guarantees that personal information remains confidential against unauthorized individuals. Information security also prevents the risk of identity theft and uses security measures to protect individuals from financial scams and fraud.

For organizations, information and system security are essential for maintaining a competitive edge. Implementing measures such as multi-factor authentication helps protect sensitive data and ensures customers are safeguarded against fraud. Businesses must prioritize their cybersecurity posture in their plans and business strategies. To do so, a business must safeguard its networks, ensuring that only authorized personnel have access and preventing unauthorized users from seeing proprietary information. A complete and proactive cybersecurity plan as part of a company's business strategy preserves the trust of customers and the company's reputation. (Ashar & Slonpas, 2024)

Computer Security Incidents: Computer Viruses and Phishing

A computer virus is a set of self-replicable instructions or program codes embedded in computer programs to adversely affect the computer use by damaging specific functions or data of the computer. Such malicious computer programs are known as computer viruses, or virus for short, due to the features they share with biological viruses. (Cuicui, 2024) They often infect computers through everyday web activities such as sharing files, downloading music or photos, visiting compromised websites, or opening malicious email attachments. Viruses can spread in various ways, including opening spam emails with attachments, enabling macros, or clicking harmful links. Common symptoms of an infected computer include slow performance, erratic behavior, and frequent crashes. Some examples of viruses are worms, trojans, and ransomware. Users should protect their computers by using antivirus protection and firewalls and updating their operating systems regularly. Users should always question any email and attachments from addresses they do not know and delete or report them.

Phishing is the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging. The attacker's goal is to steal money, gain access to sensitive data and login information, or to install malware on the victim's device. (Cisco, 2025) Attackers use seemingly benign emails or text messages to trick unsuspecting users into taking an action such as downloading malware, visiting an infected site, or divulging login credentials in order to steal money or data. (Cisco, 2025) Attackers are seeking valuable user data such as personally identifiable information (PII) or login credentials that can be used to commit fraud by accessing the victim's financial accounts. Once attackers have login information, personal data, access to online accounts, or credit card data, they can obtain permissions to modify or compromise more cloud-connected systems and in some cases, hijack entire computer networks until the victim pays a ransom. (Cisco, 2025) Phishing works by luring a victim with legitimate-looking (but fraudulent) emails or other communication from a trusted (or sometimes seemingly desperate) sender who coaxes victims into providing confidential information—often on what looks to be a convincingly legitimate website. Sometimes malware or ransomware is also downloaded onto the victim's computer. (Cisco, 2025) Protecting against phishing can be accomplished by not providing personal information to unauthorized or unsolicited requests, contacting the financial institute by phone if there is suspicious activity, never provide passwords over the phone, and review account statements regularly. (Office of the Comptroller of the Currency, 2025)

References
Cuicui, J. (2024, 01 09). What is a Computer Virus? Retrieved from Info-Finder: https://info.support.huawei.com/info-finder/encyclopedia/en/Computer+Virus.html

Linda Asher & Andre Slonpas. (2024, 04 16). Should Cybersecurity Be Part of a Business Strategy for You? Retrieved from American Public University: https://www.apu.apus.edu/area-of-study/business-and-management/resources/should-cybersecurity-be-part-of-a-business-strategy-for-you/#:~:text=They%20work%20to%20secure%20an,customers%20and%20the%20company's%20reputation.

Cisco. (2025). What is Phishing? Retrieved from Cisco: https://www.cisco.com/c/en/us/products/security/email-security/what-is-phishing.html

Office of the Comptroller of the Currency. (2025). Phishing Attack Prevention: How to Identify and Avoid Phishing Scams. Retrieved from OCC.gov: https://www.occ.gov/topics/consumers-and-communities/consumer-protection/fraud-resources/phishing-attack-prevention.html#howtoprotect

 

Comments

Popular posts from this blog

The Ups and Downs of Cricut Design Space

  Cricut Design Space . This web app is used for crafters for multiple uses. You can create designs to print, cut, and color among the many other uses it has. Made for all crafters, from beginners to the most experienced. Usability This free app with in-app purchase ability lets you create any project you can imagine. The app can be found on desktop, laptop, tablet, and mobile devices. It is somewhat user-friendly, as a beginner it is advised to view tutorials to make it easier to understand what you can and cannot do. It features ways to add images, shapes, and text. You can edit your saved projects. You can either cut, draw or print then cut. You can upload any image of your choosing, either from your photo library or any image from their library. There are many fonts to choose from in their library. You can save your projects in the cloud to access them in any device you use. You can purchase/subscribe to the Cricut Access for unlimited use of any images, fonts, or projects in t...

Scratch: Make your own program for kids

  My experience with using Scratch was as simplified as possible because this was my first time using it. The tutorials helped me build a story. After watching a few tutorials, I got started on a princess story so that I could build on it in the weeks ahead. Using the drag and drop was a lot harder than it seemed as you must pay attention to the details of positions and timing and if you use the backdrops when to switch them. In any case, the program was fun to use. The difficulties I encountered using Scratch were to position the Sprite, for example, which way was it facing, was it going to be layered behind or in front of the other sprites, or did I need to position it higher or lower to show a face-to-face conversation. The other difficulty was the timing of the conversation. How many seconds was it going to take for each character to say their sentence and when it was time to switch backgrounds and add another sprite how many seconds between them was it going to take. I ove...

Ping and Traceroute Commands

  Ping Activity For the Ping activity, I chose to ping Amazon.es and yahoo.es; both websites are from Spain. When I pinged both Amazon.es and yahoo.es, I sent 4 packets and received 4 packets with none lost. Both came back with the same round trip times.   Traceroute Activity For the traceroute activity I used the same websites. Both websites hopped 15 times. Amazon.es timed out twice while yahoo.es timed out seven times.  Traveling Through a Network Reflection Essay These tests showed me how data is transmitted and received within a specific time. The information contained in the packet that is sent contains fragments of information which is routed through the network. Each packet contains information about its source and destination and allows it to navigate through different paths to reach its final destination. These two commands help determine connection problems. Pinging a website or a computer can help the end user by checking the connectivity and...