Exercise 4 Read the following paragraph and elaborate on it by providing concrete examples of actions that governments should take in order to defend themselves from cyberattacks: Vulnerability factor exploits how vulnerable an organization or government establishment is to cyber- attacks. An organization can be vulnerable to a denial of service attack, and a government establishment can be defaced on a web page.
Exercise 5 In your opinion, which are the hackers’ main targets? Give six examples.
Exercise 6 In your opinion, which could be the main ways to prevent email containing viruses?
4) The government is vulnerable to cyber attacks because of two main reasons one of them being the lack of cyber security software.There are many companies that have such products on market.It would be a good idea for the government to allocate a budget for software that can maintain a good security level by reducing malware and viruses. However such software must be maintained by a specialist. The lack of IT professionals is also contributing to the vulnerability of the government. It is reccommanded for the government to hire programmers who can work with a security software and spot websites which deface a government establishment. If these suggestions are implemented, the current situation is bound to improve.
5) Hackers may have many reasons to hack someone else. The targets must be people or organisations which can bring them benefits. I believe that wealthy people , rich companies and people who spend a lot of time online are the main targets because hackers can easily steal huge amounts of money from them. However some „white hackers” do not want to steal anything. Their intentions are to make a good impression (by using their skills)and to get hired by some companies, hence the reason they might hack governmental organisations ,online security companies or other people who might hire them for their skills.
6) There are many ways in preventing getting viruses from contaminated mails. One of them is using the latest technologies (pcs, phones)because they include software that can spot danger . The less expensive is to be careful about links and never accidentally ” agree” with something from a strange email .