Tuesday, June 11, 2019
Information Security Issues Associated with Internet Connectivity Essay
Information Security Issues Associated with Internet Connectivity - Essay ExampleThe report presents some recommendations such as apply some policy, procreation their employers and employing softwares for security checks.With the advanced technology that we have right now, security issue has become an essential problem for any organization, which drills the Internet, around the world. As stated by Charles and Shari (23, 2002), the security of an organization is all important(p) to protect it from any criminal damage. The software vulnerabilities and social engineering in an organization establishment that cyber-criminals target is the close to important issue in security measures. The aim of this research is to investigate how to protect an organization that uses Internet connection from being targeted because of the vulnerability of their constitution. This report will dispute general issues related to Internet connectivity, software vulnerabilities, social engineering and sp ecific vulnerability which is Cross Site Scripting (XSS). It will also provide a preaching and recommendation that will help organizations against hackers and other criminal activities directed in breaching their security.Hacking a system or a database is the largest threat to network security for most organizations. IP addresses can easily be obtained through search engines like Google and Yahoo. As a result, the Internet gives easy access to an organizations system or database for millions of unknown users in the world. And because the users are unknown, it creates additional challenges to the security departments. In addition to the countless unknown users, the links of different systems and database between organizations through the use of the World Wide Web makes it easier for one to access the linked systems. Moreover, the linked access introduces a considerably magnified potential for virus spread. The vulnerability of the system is the primary weakness of an
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment