Saturday, May 4, 2019

Twelve Security Attack Trends of 2011 Essay Example | Topics and Well Written Essays - 2000 words

Twelve Security Attack Trends of 2011 - Essay Example batch involved in the business of hacking widely adopt this attack. Security products be not yet fitting to launch any remedy for it (ComputerWeekly 2010) The second tribute threat is about file security system which is from share-out of files, applications and entropybase that is growing at the respect of 60% annually. File sharing is getting popular day by day specially after launching of Microsoft product Sharepoint. Expansion of Payment Card Industry (PCI) data Security Standard (DSS) technology to organizations and files besides databases and web applications have open new doors for the attacks Careful measures are needed to protect attacks such as data thefts and files manipulations (ComputerWeekly 2010) The third security threat is from the growth of Smartphones food market due to its integration with various web applications and global databases. Intimation to consumers about completion of each and all transaction in their account through SMS messaging services has generated new opportunities for hackers who could use the path of direct data outside the domain for attack. This path of data transition can be used by intruders for data theft and unauthorised access (ComputerWeekly 2010) The fourth security threat is from cloud computing as the large infrastructure of information technology is now rapidly shifting to cloud where hackers and intruders are already present. They will come side by side and the chance of security breach will increase. Opportunities for con cardinald will develop with the development of consumers and customers of cloud computing (ComputerWeekly 2010)The fifth security threat is from insider. The high rate of job loss due to economic recessions have built a huge source of good deal who are frustrated and disgruntled and ready to take revenge or make money. The economic compress and opportunities for selling information may pose serious threats to their previous em ployers (ComputerWeekly 2010)The sixth security threat is from tender networks which have attacked privacy of many people by collecting information in the name of personalised profiles. Tricks such as false promises and incomplete information are used to attract people for disposition of personal information (ComputerWeekly 2010)The seventh security threat is from convergence of regulations of most countries and to have global laws for data security and privacy. This can bring many more opportunities for intruders and hackers (ComputerWeekly 2010)The eighth security threat is from the separation of cyber security and business operations. Keeping cyber security apart from business operations has created huge opportunities for hackers and individuals. The trend of making cyber security the part of business operations is developing rapidly for example Intel Corporation made acquisition of McAfee and HP of Fortify (ComputerWeekly 2010)The ninth security threat is from the proactive approach of security practitioners which has although helped in catching more hackers, created strong professional bar of hackers (ComputerWeekly 2010) The tenth security threat is from the attacks of hackers on industry. Success of industrialized hackers has promote many more hackers to learn and adopt this approach (ComputerWeekly 2010)Figure 1 shows the extract from (ComputerWeekly 2010) which describes the above ten security threats of 2011Figure 1 Extract (ComputerWeekly 2010)The eleventh security threat is from cyber war which began with the leakages of Stuxnet and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.