Friday, May 10, 2019
Research survey Coursework Example | Topics and Well Written Essays - 3000 words
search survey - Coursework ExampleThere be very many cyber crime that gutter be inducted employ the computer or with the aid of a computer. The most appropriate way to look at it in detail is identifying them by the types and level of cyber attacks.Cyber attacks are a deliberate or unintentional unauthorized task, which cannot be avoided or is in avoidable that that is capable of causing a vagary on the cyberspace resources. The compass of cyber attack is expands from hardware, software, data that is stored, data in transit, people, documents and other hardware needed corresponding printer cartridges. arena of the problem The different types of attack that amount to cyber crime and are detriment to cyber security are keylogging and spyware. This is a malware that is built to illegally obtain, track and block the right of a user to get access to the system. An vitrine of this attack is where someone or an individual tries to log on to the system or a website like an email acco unt but the system or the site fails to authenticate the user. To prevent this system administrators should show a mechanism where if the user complaints of such issue the system should prompt the user by request some questions relating to the account. The second attack is backdoor or command/control. These are weapons that give remote access that are created to divert the functionality of the system. The other attack is SQL injection. This is a unique attack that targets the web pages of the system application. It cuts down the converse between the database and the system application interface. This attack is common in organization where system implementation is victorious place. An example is a situation where an attacker alters the name of the database and hence disconnects it from the user interface. The best measure that can be used to curb this is by limiting the number of the people who has the right to manipulate the database activates and in addition the punishment that individual that uses a computer to physically hurt another person or tries to commit a felony with an aid of a computer is made severe. There was also a provision of wide security to media group that gave hand to the police while carrying out the investigation while the vulnerable attacks that were back up were blacklisted so that more security concern were availed in those areas (Middleton, 2005). Another attack that is very rampant is malignment of system access rights. This kind of attack is mostly executed by the employees in a friendship in and intention of vengeance or sabotage. Detecting such issue is cumbersome since the intrusion volition be taking place internally and hence task tracking may be a challenge. The employees use his or her right to access the system to make alteration and modification of data with the connotation of financial gains for example in an employee in the IT department of a water providing company can depress the consumption figures of some s pecific accounts then liaise with the holders of those accounts for payment. To combat all frauds that are related to contradictory billing, the people that are authorized to enter the companys data concerning the customers must exercise the professed(prenominal) ethics to the fullest. Individual that are given this assignment must have the appropriate integrity basing on the previous records. A body that vets such individual should be established. Such a body should be external and should randomly do the auditing to ensure that the way the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.