21 6月 英国 代写：警惕网络安全
鱼叉式网络钓鱼(Spear phishing)、直接攻击(direct attack)是这些系统渗透并破坏现有系统的一些模式。应该定期加强意识程序，以确保用户是警惕的，不太可能欺骗APT进入网络。IT部门习惯于随时了解最新进展。先进的安全控制、流程管理和IT人员培训导致成本增加(Maheshwari & Pathak, 2012)。组织应确保拥有最先进的API，以防止云计算网络中的APT攻击。组织应确保在适当的地方拥有所需的资源，以保护其数据免受APT和其他攻击(Maheshwari & Pathak, 2012)。这需要在系统中进行竞争。随着云计算的发展，越来越多的人报告数据丢失在供应商的错误。系统中存在恶意黑客，他们完全删除系统中存储的数据和信息(Kim & Hong, 2012)。
为了解决这些病毒攻击的问题，应该有一个分散的计划来处理这些公司的威胁。公司应该有足够的数据备份措施，并确保他们有最佳的业务实践，以解决可能受到攻击的问题(Mosher, 2011)。应设置日常数据备份存储和常规信息存储，以保证公司运营过程的连续性。系统漏洞和程序中的bug并不新鲜。他们是更大问题的一部分。研究发现，这些组织可以共享彼此更接近的记忆和其他资源(Lee, 2012)。这里创建了新的攻击面。应经常进行分析，以确保表面不受攻击。这些针对系统漏洞的攻击可以看作是一个基本的IT过程(Lee, 2012)。应该制定最佳实践和方法来解决这些问题。应该有及时的补丁管理和对安全威胁问题的快速跟进。
Spear phishing, direct attacks are some of the modals through which these systems infiltrate and cause damage to the existing system. There should be regular reinforce of the awareness programs to ensure that the users are alert and are less likely to trick the APT from entering into the network. The IT department are used to stay informed of the latest advancement. There is the advanced security controls, process management and IT staff training that leads to increase in the costs (Maheshwari & Pathak, 2012). The organizations should ensure that they have the most advanced API to prevent APT attacks in the cloud computing networks. The organizations should ensure that they have the required resources in places to protect their data from APT and other attacks (Maheshwari & Pathak, 2012). This needs to be contended in the system. With the development of the cloud, more people report of data loss in the provider error. There are malicious hackers in the system who are found to delete the data and information stored in the systems completely (Kim & Hong, 2012).
To address these issues of virus attacks, there should be a decentralized plan in place to address these threats by the company. There should be adequate data backup measures by the company and ensure that they have best business practices in place to address the issues of possible attacked (Mosher, 2011). There should be a daily data backup store and conventional storage of information for the continuity of the operation process of the company. There are the system vulnerabilities and the bugs in the programs that are not new. They are a part of the bigger problem. The organizations are found to share their memory and other resources in closer proximity to one another (Lee, 2012). There is the creation of the newer attack surface. There should be constant analysis to ensure that the surface is not attacked. These attacks on the system vulnerability can be considered as a basic IT processes (Lee, 2012). There should be best practices and approaches that should be developed to address these issues. There should be prompt patch management and a fast follow-up on the issues of security threats.