Logotype

computer vulnerabilities computer reliability

12/30/2019
273

Forgery, Education And Pcs, Computer Infections, Hacking

Excerpt from Research Paper:

Computer Vulnerabilities

Computer Security Vulnerabilities

The extent with the problem

This may not be a small issue. The book “Analyzing Laptop Security” lies out the next scenario: “First, 20 million U. S i9000. smart phones go wrong. Next follow outages in wireline mobile phone service, issues with air traffic control, interruptions to the Nyse, and eventually extreme loss of electricity on America’s East Coast” (Pfleeger Pfleeger, 2011, 3). The creators are discussing a situation where the computer networks that control those products and solutions are affected. As continues to be seen in recent times, this lack of computer secureness is something that is no apocalyptic misconception, but an sad reality. As soon as systems are designed to thwart attackers, they are damaged and new security steps have to be set up. It is a never-ending battle that needs a cautious and formative security staff to law enforcement. Unfortunately, these types of large breaches have simply increased in recent times.

Vulnerabilities that caused main loss/damage

Regardless of whether it is someone, company or government, pc vulnerability may cause endless problems such as identification theft, loss in customer info, or an event such as the one which occurred in Usa in 2010.

“Siemens equipmentcalled Industrial Control Systems or ICS, is the product targeted simply by Stuxnet, the sophisticated computer worm discovered a year ago to have crippled Iran’s elemental power program. Stuxnet reprogrammed the computer-controlled centrifuges used to enrich uranium so that they spun out of control and destroyed themselves” (Waterman, 2011).

This was a great incident that could have brought on even more serious destruction if the hackers had been in a position to penetrate reliability even further.

Virus/Hacking statistics

The trend in malware and pc hacking disorders has been increasing for many years. “As of June 2006, Symantec’s Norton Malware software examined for over seventy two, 000 regarded virus patterns” (Pfleeger Pfleeger, 2011, 87). This statistic was current more than five years ago, which means at the rate of growth of these types of attacks it can be assumed that the number of could quickly create exceeded 2 hundred, 000. Cyber-terrorist have been enjoying a lot more marketing and scrutiny in recent years. There are no real statistics regarding how various hackers are present and the specific figures of how much cracking has cost U. S. companies is also hard to determine. The reason is that “disclosures about monetary problems caused by hackers rarely were made public, and a lot of companies will not bother determining the total because they are too active fending away hackers, or perhaps they are also embarrassed to report the incident to law enforcement” (Nowak, 2011).

Security requirements

The government features tried to determine standards since computer technology offers blossomed, but it really is hard keeping up with all of the changes that are continuously being made. The government organization that controls secureness standards is referred to as the Countrywide Institute intended for Standards and Technology (NIST). Since the early on 1970’s, this organization have been attempting to write encryption standards. Originally this is done to get the military, but eventually the need was for a common set for all those entities that held details that could be regarded a nationwide security risk.

Direct factors behind vulnerabilities

SQL Injection

The term SQL is really an abstract of organised query vocabulary which is used in database management devices (Pfleeger Pfleeger, 2011, 541). In this sort of attack a hacker can use the language, coming from a internet browser, to tell the database to release information. This could be used to notify a financial website to release the names and account information of all the people that they may have on record if the end user knows a few simple commands.

Phishing

This can be an interesting word game00 that can be probably the most personally harmful vulnerabilities around. Hackers understand that certain issues with an account might cause an individual to shed their caution and respond to a message in which they need to give personal information. Scam occurs for the individual is asked to give personal information to clear a problem that appears legitimate. The problem is that the phisher has duplicated the website brand and other vital information so that an

  • Category: technology
  • Words: 775
  • Pages: 3
  • Project Type: Essay

Need an Essay Writing Help?
We will write a custom essay sample on any topic specifically for you
Do Not Waste Your Time
Only $13.90 / page