Malware and Hacking Attacks Research Paper

Total Length: 586 words ( 2 double-spaced pages)

Total Sources: 1

Page 1 of 2

Asset Descriptions

Computer Server

A computer server is basically a fancier computer that serves as a centralized point for one or more functions that are used by one or more workstations, commonly referred to as clients. Servers can be used as launch points for applications, as a place to store files and so forth. For example, a Citrix server could be set up so as to allow people to use their "2nd Desktop" web portal. This allows people to log into the server and use applications online even without the program files and so forth being on the local workstation that is using the program (Citrix, 2015).

Personnel Files

Personnel files are those that relate to the employment records of an employee. Examples of personnel records could and would commonly include I-9 forms, W-4 forms, W-2/W-3 forms, performance reviews, any records of disciplinary action, job applications, wage and compensation information and so forth. Particular data points that are worth mentioning are Social Security numbers, full name, home address, prior employment information, date of hire and so forth. These files could be in printed/paper form or they could be entirely digital. Other times, forms start off as paper-based but are scanned into a computer system using a PDF scanner or something along those lines (SHRM, 2015).


Threats to Assets

Computer Server

The two main threats that will be discussed on this page are malware and hacking. Malware is a danger because it can get onto computer workstations and/or servers quite easily. Whether it be phishing attacks through email, going to the wrong website, downloading the wrong file and so on, malware can make its way where people do not want it. The results of this malware, depending on what is "contracted," would be data theft, data destruction, simple annoyance and/or pranking and the like. In short, there is almost surely going to be some sort of loss of time/productivity and perhaps data as well. Hacking is much the same thing except that it is a direct attack by a live person, an automated computer or a slew of them working together (MIT, 2015).

Personnel Files

When it comes to malware and hacking, personnel files are especially precious and important to protect, and for a number of reasons. First, many of the forms and documents on hand (e.g. I-9, W-4, W-2, etc.) have to be retained and kept for compliance reasons. Second,….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Malware And Hacking Attacks" (2015, December 13) Retrieved May 17, 2024, from
https://www.aceyourpaper.com/essays/malware-hacking-attacks-2159351

Latest MLA Format (8th edition)

Copy Reference
"Malware And Hacking Attacks" 13 December 2015. Web.17 May. 2024. <
https://www.aceyourpaper.com/essays/malware-hacking-attacks-2159351>

Latest Chicago Format (16th edition)

Copy Reference
"Malware And Hacking Attacks", 13 December 2015, Accessed.17 May. 2024,
https://www.aceyourpaper.com/essays/malware-hacking-attacks-2159351