Newspaper Articles on Information Security Threats 2
Methods of Spreading Awareness 3
Potential Threats 5
Classified Letter 6
References 9
Newspaper Articles on Information Security Threats
The number of articles found, discussing and reporting the threat to information security were four. A brief summary of each is given as follows:
The first article was the threat posed due to the malware viable and distributed on the internet. The social networking websites and other free sources of software are major source of such malware. The content comes to the user disguised as a message or a statement from a friend. It turns out to be a collection of malware and virus which affect an individual’s computer in drastic form. These malware are easy to install and one or two wrong step on the part of the users can result in large problem. Such malware are difficult to identify and occur on daily basis. If activated by mistake, they may result in loss of large amount of data crashing of an individual’s computer, or even loss of memory. The article goes on to warn online users to be aware of the potential threats posed and be extremely careful while opening such software on one’s computer.
The second article discussed the threat posed to information security via the hacking of one’s internet addresses. The massages sent via such sources are normally spam or virus in nature. This also leads to the person, whose email id is being used to send such messages. It also happens that the mails sent may be derogatory in nature and may lead to stressful conditions in a person’s life. The best way to prevent such conditions is to keep all forms of identification personal, and to not use any form of public computers.
The third article discussed the lack of information security provided by mobile phone networks. With the advent of the smart phones and the usage of the internet becoming a daily process on one’s mobile phone, the attacks on information security have
References: * Gudena, C. (2008). Information Security Awareness * De Borchgrave, A., Cilluffo, F. J., Cardash, S. L., & Ledgerwood, M. M. (2001).Cyber threats and information security: meeting the 21st century challenge (p. 57). CSIS Press * Whitman, M. E. (2003). Enemy at the gate: threats to information security.Communications of the ACM, 46(8), 91-95 * Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Course Technology Ptr