Professional Documents
Culture Documents
University
Student’s Name
Date of Submission
Instructor
Cyber Attack
The lecture’s main topic was the security of computer systems and avoiding cyber
attacks. The lecturer talks about the fundamental reasons hacks happen all the time. The main
reasons are the use of the same security protocols and infrastructure that has been used for more
than a decade. Examples of these security web servers that have been used for long and continue
to utilize the same architecture include IIS and Apache web servers, Windows and other Unix-
based systems and web browsers such as Firefox Internet Explorer and. He advises that the
predictability of usage by hackers makes it easier for them to hack computers. He also talks
about the origin of prominent security companies having their origin in Israel for political and
social reasons, and that the same country pays for its young citizens to learn how to hack. In the
United States, companies that served Security services in the virtual software world have existed
for over a decade without innovation in the industry. AS a result, the systems protected by these
companies are at risk of security breaches in cyber attacks such as the DDoS, zero-day, zombie,
botnet and Stuxnet attacks among other attacks. Most of the Fortune 500 companies and other
influential financial entities are protected by these vulnerable companies that already have holes
in their systems.
Surname 2
Vendors decide what gets developed, but the choice of what platforms and security
measures to use remains in the hands of the user. He cautions against the use of software
platforms and systems that are vendor-controlled in the favor of open-source systems. In this
regard, Linux operating system is the most secure operating system. I have also learned a new
way of securing myself from cyber attacks, be it servers, computers or online platforms. The
most valuable lessons from the lecture are that one should regularly update their software, set up