Writing tips and writing guidelines for students,case study samples, admission essay examples, book reviews, paper writing tips, college essays, research proposal samples
Saturday, June 15, 2019
Twelve Security Attack Trends of 2011 Essay Example | Topics and Well Written Essays - 2000 words
Twelve credential Attack Trends of 2011 - Essay ExamplePeople involved in the art of hacking widely adopt this attack. Security products atomic number 18 not yet able to launch any remedy for it (ComputerWeekly 2010) The second gage threat is about file security which is from sharing of files, applications and infobase that is growth at the rate of 60% annually. File sharing is getting popular day by day specially after launching of Microsoft product Sharepoint. intricacy of Payment Card Industry (PCI) Data Security Standard (DSS) technology to organizations and files besides databases and web applications have open new doors for the attacks Careful measures are postulate to protect attacks such as data thefts and files manipulations (ComputerWeekly 2010) The third security threat is from the growth of Smartphones market due to its integration with various web applications and global databases. lead to consumers about completion of each and every transaction in their account through SMS messaging services has generated new opportunities for hackers who could use the path of sending data outside the domain for attack. This path of data transition can be used by intruders for data theft and unauthorised access (ComputerWeekly 2010) The fourth security threat is from cloud computing as the large infrastructure of information technology is now rapidly shifting to cloud where hackers and intruders are already present. They allow for come side by side and the chance of security breach will increase. Opportunities for attacking will develop with the development of consumers and customers of cloud computing (ComputerWeekly 2010)The ordinal security threat is from insider. The high rate of job loss due to economic recessions have built a huge source of people who are frustrated and disgruntled and ready to take revenge or make money. The economic pressure and opportunities for selling information may pose serious threats to their precedent employers (Compute rWeekly 2010)The sixth security threat is from social networks which have attacked privacy of many people by collecting information in the name of personal profiles. Tricks such as false promises and incomplete information are used to attract people for collection of personal information (ComputerWeekly 2010)The seventh security threat is from product of regulations of most countries and to have global laws for data security and privacy. This can bring many more opportunities for intruders and hackers (ComputerWeekly 2010)The eighth security threat is from the separation of cyber security and business operations. Keeping cyber security apart from business operations has created huge opportunities for hackers and individuals. The trend of making cyber security the part of business operations is developing rapidly for workout Intel Corporation made acquisition of McAfee and HP of Fortify (ComputerWeekly 2010)The ninth security threat is from the proactive approach of security practi tioners which has although helped in catching more hackers, created unfluctuating professional bar of hackers (ComputerWeekly 2010) The tenth security threat is from the attacks of hackers on industry. Success of industrialized hackers has encouraged many more hackers to learn and adopt this approach (ComputerWeekly 2010) configuration 1 shows the extract from (ComputerWeekly 2010) which describes the above ten security threats of 2011Figure 1 Extract (ComputerWeekly 2010)The eleventh security threat is from cyber war which began with the leakages of Stuxnet and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.