top of page
Blog: Blog2
Search
  • Writer's picturemarshasmith306

A Guide on Information Technology Services




Information technology services are modern driven technological services which include web hosting, internet support providers and tech-support companies. Information technology services encompass various jobs which are; programmers, IT specialist, technical team, software and hardware engineers, website developers and network engineers.


Cyberattack is any wrongful activity performed with an aim to alter the functioning or gain unauthorized information from computer networks, computer information systems or personal computer devices. To try and gain unauthorized entry into a computer system, a cyber-attack hacker can try either of the following procedures; denial of services(DOS), malware, phishing, session hijacking, structured query language, and cross-site scripting


For a phishing attack to take place, a dubious email attachment is sent to a computer system and upon opening it a malware is automatically installed into the computer altering the normal performance of the targeted computer. An attacker plays around with the users' emotions by sending a link which may arouse confusion, need for urgency or get quick false promises and upon click on the link a malware is installed in your computer.


Spear attacks, pharming, ACE-ITS phishing, whaling are some of the forms in which phishing can be executed.Whaling attacks are usually focused on high profile targets with the aim of capturing company's data, company's intellectual property and personal credential that can be used to blackmail or even sold at black market. Cloning attacks happens when a user receives a clone of a valid message they had received earlier but there is a bit of change made to it by the attacker to trap the user. Spear phishing attacks happen when an attacker creates a false link after gathering important information that will make the link seem real. Once clicked, the link installs a malware which makes allow for a wire transfer to take place.


To protect hacking into an email a user needs to apply the following; use of strong passwords, spam filters, changing the passwords frequently and use of certified antivirus. A spam filter is a program that detects false emails and ensures that they do not find their way to a user's inbox. Computer viruses and spam can be stopped from getting into a user's inbox by email filtering which is the organizing of emails. ACE-ITS email protection can take the form of; inbound filtering or outbound filtering.


Inbound filtering is where messages from the internet are scanned by the filtering system. Pending messages from a local user are first scanned before been allowed over the internet in a process known as outbound filtering. In ensuring that workers observe the code of conduct for email, mail filters can be used and keep a check on the outgoing emails. Get more here: https://en.wikipedia.org/wiki/Information_technology_management.

11 views0 comments
bottom of page