You are on page 1of 2

Surname 1

University

Student’s Name

Date of Submission

Instructor

Cyber Attack

The lecture’s main topic was the security of computer systems and avoiding cyber

attacks. The lecturer talks about the fundamental reasons hacks happen all the time. The main

reasons are the use of the same security protocols and infrastructure that has been used for more

than a decade. Examples of these security web servers that have been used for long and continue

to utilize the same architecture include IIS and Apache web servers, Windows and other Unix-

based systems and web browsers such as Firefox Internet Explorer and. He advises that the

predictability of usage by hackers makes it easier for them to hack computers. He also talks

about the origin of prominent security companies having their origin in Israel for political and

social reasons, and that the same country pays for its young citizens to learn how to hack. In the

United States, companies that served Security services in the virtual software world have existed

for over a decade without innovation in the industry. AS a result, the systems protected by these

companies are at risk of security breaches in cyber attacks such as the DDoS, zero-day, zombie,

botnet and Stuxnet attacks among other attacks. Most of the Fortune 500 companies and other

influential financial entities are protected by these vulnerable companies that already have holes

in their systems.
Surname 2

Vendors decide what gets developed, but the choice of what platforms and security

measures to use remains in the hands of the user. He cautions against the use of software

platforms and systems that are vendor-controlled in the favor of open-source systems. In this

regard, Linux operating system is the most secure operating system. I have also learned a new

way of securing myself from cyber attacks, be it servers, computers or online platforms. The

most valuable lessons from the lecture are that one should regularly update their software, set up

and configure firewalls correctly and avoid suspicious websites.

You might also like