IT402_Unit7_Assignment_.docx IT402 Purdue University Global Assignment Unit 7 IT402 IT Consulting Skills OReilly Design is an outstanding company for interiors designs on pubs, bars, restaurants, and night clubs. H
...
IT402_Unit7_Assignment_.docx IT402 Purdue University Global Assignment Unit 7 IT402 IT Consulting Skills OReilly Design is an outstanding company for interiors designs on pubs, bars, restaurants, and night clubs. Having an online presence is a great thing to get clients from local and international. Having the website makes it easy and convenient for clients and the company to interact with each other. Online is a great place for marketing and connecting with clients, however there are risks of being online as well. There can be potential risks related to cybercrime like virus/worms or phishing. Cybercrime is an illegal crime committed on the web. This criminal activity usually targets or uses computer, network or networked device. Cyber crime that targets the computers usually involve the use of virus and other malware to infect the computers. Other crimes can simply be committed from the use of email. Sending real looking security email for the place they work at. Lets discuss about malware attacks. A malware or a virus attack is usually targeting computers, networks or a device on the network. Malware can infect a computer from downloads via faulty or misleading websites, emails and more. In this scenario if an employee were to use company computer to view websites or emails that are not safe or work related, can have a potential of getting a virus from download or opening up the infected site. The purpose of this type of attack is to gain access to confidential data, clients information, data. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Show More]