Five Issues or Challenges Pertaining To Computer Security

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

TRINIDAD, Beatx Gwyneth O.

I. Five Issues or challenges pertaining to computer security

Password theft - The use of weak or readily guessed passwords by students is another significant hazard to
online learning. Students use Zoom as well as any other programs they use for their online classes. They
utilize several cloud-based services, each of which calls for a distinct account which sensitive data can
frequently be found in these services. This information may be hacked if weak passwords are used, or if the
same password is used across several accounts.

Bad backups - The school activities, homework, summative assessment, and the exam depend on the data it
has on the students’ work. It is destroyed if that said data was lost or became corrupt. To assist reduce this
danger, it is advised to make sure that all data is adequately backed up and stored offsite.

Outdated Hardware - Students eventually need to switch to more modern hardware they utilize. Once an
outdated piece of hardware has reached its end of life, the developer stops producing security updates for that
hardware.

Software vulnerabilities - An older software version that students use in online class like the Microsoft Office
might contain patches for security vulnerabilities that are only fixed by a newer version.

Cracked Software - Once it penetrated the security of one device via cracked software, malware can travel
over networks.

II. Five Issues or challenges pertaining to cyber security

Ransomware attacks - An educational institution's network generates more data the more devices it has
connected to it, making an attack more enticing. This results in devices getting infected, endangering networks
and the privacy of students' data as well as the school faculties.

Unsecure mobile computing – Gadgets are increasingly used today for online learning. A single unprotected
device increases the risk of compromising the entire school network and systems, especially at a time when
schools have lowered the barriers to access their networks, specifically for students. With most devices
connected to the internet, the attack surface is significantly amplified for schools.

Phishing Attacks - Phishing scams are an older attack method and rely on social engineering to achieve its
goal. Typically, students receive a message or in their SLU email account which requests sensitive data, such
as a password. Sometimes, the phishing message appears official, using legitimate appearing addresses and
media.

Distributed Denial of Service - The malicious parties may target students’ servers and overload them with
user traffic. When a server cannot handle incoming requests, the website it hosts shuts down or slows to
unusable performance.

Traffic Interception - Also known as “eavesdropping,” traffic interception occurs when another user of a
computer “listens” to info sent between a student and host. The kind of information stolen varies based on
traffic but is often used to take log-ins or valuable data.

III. Recommendation

Understanding and addressing these potential dangers is the greatest way to effectively protect our networks
and systems as they continue to get more complicated. To guarantee that students are aware of security
hazards and how to prevent them, a complete set of security tools should be in place along with security
awareness training.

You might also like