The password leaks of cracks. · It

The Possible ways of how
our personal computer system could be compromised.

 

1)      Malicious
software could be compromised our personal computer.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Ø  Malicious
software is virus, worm, Trojan horse, root kit, spyware, key logger, network
sniffer, back door, and dialer.

 

2)      Infrastructure
or service problems could be compromised our personal computer.

Ø  It
may be failure of Software, Hardware.

Ø  It
may be failure of  electricity which is
power outage or power surge

Ø  It
may be failure of network which is cable cut or saturation.

Ø  It
may be failure of Air-conditioning, System upgrades, and Service providers.

Ø  It
may overload of CPU, memory, storage, and network.          

 

3)      Human
errors could be compromised our personal computer.

Ø  Human
keep weak security.

·        
It may be loss of laptops, smartphones,
and USB-sticks.

·        
It may be no encryption, and password
leaks of cracks.

·        
It may be computer console left unlocked.

Ø  Human
are misunderstanding computer interface or other mistakes.

Ø  It
may be deleting data and corrupting data.

Ø  Confiscation
of machines could be compromised our personal computer.

 

4)      Downloading
free software could be compromised our personal computer.

When user download a free
software sometime it will introduce malware, viruses or buggy   software.

 

 

 

 

5)      The
personal computer system could be compromised by without install operating
system updates.

Any computer user is to always install security
updates, when they become available for your operating system. When operating
systems are developed, bugs, or programming errors, are unfortunately created
that could cause security vulnerabilities or make your computer act
unexpectedly. 

 

6)     
The personal computer system could be
compromised by without keep installed applications up-to-date

The personal computer as secure as possible, user need
to make sure these programs are updated when new security fixes are released.
The problem is that many people just ignore alerts about new updates, even
though these updates fix security problems that could allow hackers into your
computer.

 

7)     
The personal computer
system could be compromised by without
Install ,update, and use anti-virus software

The computer has antivirus software
running on machine. By having an antivirus program running, files and emails
will be scanned as use them, download them, or open them. If a virus is found
in one of the items people are about to use, the antivirus program will stop you from being able to run
that program and infect yourself.

 

8)     
The personal computer
system could be compromised by having poor password.

 

9)     
The personal computer system could be
compromised by without keep windows
up to date. 

Hackers often
discover new ways to bypass Windows’ built-in security features, which is why
Microsoft issues small operating system updates every Tuesday and larger
updates once or twice a year. These will be downloaded and installed
automatically by Windows Update, but only if this feature is properly
configured.

 

 

 

 

 

 

10)   The
personal computer system could be compromised by don’t turn on the windows firewall.

Windows has a built-in ‘firewall’ that protects your PC from unwanted
attention via the internet.

 

11)   The
personal computer system could be compromised by don’t use the latest version of the web    browser.

Web browsers are vital applications, but just like other software, they
can contain bugs. Once a web browser has been compromised in this way, a hacker
can monitor everything you type, including passwords to credit card numbers.
That’s why it’s vital to use the latest version of your web browser -anything
other than this may be a security risk.

 

12)   The
personal computer system could be compromised by falling for phishing emails.

 

13) 
 The personal computer system
could be compromised by don’t use the windows
malicious software removal tool.

 

14) 
The personal computer system could be compromised by attachments from people you don’t know.

 

 

 

 

 

 

 

 

 

 

The possible attack
vectors.

 

These are the possible attack
vectors.

Ø  Denial
of Service Attack (DoS Attack)

Ø  Keystroke
loggers

Ø  Malware

Ø  Phishing

Ø  SQL
Injection Attack

Ø  Cross-Site
Scripting (XSS)

Ø  Session
Hijacking Attack

Ø  Man-in-the-middle
Attack

Ø  Credential
Reuse

Ø  Chat
Rooms

Ø  E-mail
attachments

Ø  Pop-up
windows

Ø  Instant
messages

Ø  Web
Pages