Phishing and Malware Attacks:1392513

Question one

Phishing attacks – these attacks have grown and developed over the past few years they are very difficult to combat since they involve social engineering of clients as targets rather than rather than targeting social weaknesses. These attacks can be prevent by having secure and strong email gateways to keep employees from receiving phishing emails in their inbox.

Malware attacks – it comprises of a combination of several security threats such as Trojans and viruses with the aim to destroy data on computers, malware attacks cause expensive damage that can take a while to repair and recover data. This attack has crippled several companies in the past.

Ransomware – this is a common cyber threat that attacks thousands of companies every year. It involves encryption of company data then forcing the company to pay a certain amount to have their data unlocked. Small businesses with weak cyber security systems are prone to this attack.

Weak passwords – the use of weak passwords that do not meet the basic requirements for a standard password is a threat to any company since the password can be easily cracked or brute forced by hackers.

Insider threats – this is a risk caused due to the actions caused by former employees, current employees, associates or business contractors. Due to the privilege of access to the company’s critical data, this can lead to harmful effects through malice or greed.

Question two

Torrents provide a fast, reliable and an effective way to download files from internet however the use of torrents is associated with several risks such as:

  1. Malware – torrents provide a great risk of easily acquiring malware from the internet this is because the download sources are not verified since they are uploaded and maintained by users who wish share and upload data files
  2. Data safety – due to the p2p network created by use of torrents this easily opens a gateway to personal files that should not be exposed to the internet.
  3. Vulnerability – online hackers can use the information provided on a p2p torrent network such as online peers and IP addresses to easily find vulnerabilities and gain illegal access into systems.
  4. Legal troubles – the use of torrents could lead to legal issues since most of the data downloaded on these networks is copyrighted and should not be shared without the owner’s consent.
  5. Spread of illegal data – the use of torrents has led to the sharing of illegal data such rainbow tables for cracked hashes and password lists.

Question three

Unlike the United States of America in Australia there is no constitutional charter of rights that protect the freedom of speech the system is based on common law and limited freedom which is often referred to as political communication as implied in the Australian constitution. Freedom of speech is a freedom that Australia holds dear and it would be better protected if it was recognized as a positive right that should be free to everyone.

Differences

  1. As opposed to the United States of America freedom of speech is not represented in the constitution as it should.
  2. In Australia it is easier for plaintiff to win to win a libel action compared to the USA since in the US the plaintiff has to prove the claim was false as well as dishonest.
  3. As opposed to the United States in Australia one can be liable to the words used if they seem offensive to a racial group unless they can succeed in various defenses which are so restrictive.
  4. In America freedom of speech allows you to express literally anything without fear of prosecution however in Australia you may be liable to the words used in the process.
  5. The Australian law seemingly provides a fair balance compared to the U.S. law since freedom of speech in the US has promoted the racism through speech.

References

The weekend Australain, Australians expect freedom of speech, so let’s make it our right, [accessed from] < https://www.theaustralian.com.au/commentary/australians-expect-freedom-of-speech-so-lets-make-it-our-right/news-story/8be42ad9952fc2e004a8493ed8baa069>

Chron, What are the dangers of torrents, [accessed from] <https://smallbusiness.chron.com/dangers-torrents-70661.html#:~:text=Legal%20Troubles,sharing%20of%20such%20data%20illegal.>s