AllBestEssays.com - All Best Essays, Term Papers and Book Report
Search

Web Based

Essay by   •  May 30, 2013  •  Essay  •  1,197 Words (5 Pages)  •  1,374 Views

Essay Preview: Web Based

Report this essay
Page 1 of 5

With everything in today's business going to web based applications, there is a big call for security. From how to handle tough issues that are happening as well as how to protect one's self. With all the threats out there one should not be scared, there are some simple ways to take care of all these issues. According to Ericka Chickoswski from channelinsider.com "More than 800 IT professionals from SMB said in a survey that 32% of organizations have suffered from SQL injection attacks on their Web sites. 60% have reported attacks from viruses. 57% have suffered phishing attacks. 35% have suffered hacking attacks." That is a big number, but not to worry with simple ways to stop attacks such as Viruses Phishing, Hacking, and SQL Injections. We can live in a world with better and more secure internet.

You might be asking yourself, "What are some of these attacks?" Well it's simple; let me break them down for you. One of the biggest attacks from the survey was viruses. Viruses are classified as a computer program that looks for weaknesses in your system or network. If someone were to find it, they would be able to exploit it and use it to their advantage. Now there are three reasons someone might do that, either they want to see if they can exploit it for their amusement or to get your personal information. This type of attack is bad and is the most common. There are tools out there for hackers to use in order to make a virus that literally no one knows is there. The reason an Anti-virus cannot detect it is because antivirus only look for signatures that the virus has. The hacker can change one line of code and the signature to that virus changes. Another big virus known is called a worm, these are programs that replicate and send themselves to another computer from yours. These are equally nasty if they get into your network. They replicate from your network and work their way to another network that you are connected to. These types of attacks can be stopped with a good anti-virus program as well as good user policy of not downloading from unknown links or from a link that might look suspicious. Unless accepted by a supervisor, best practice would be, if you don't know what it is not to download it. Hackers are hard to deal with as they can be both good and bad for your network. Hackers are people who want to get into your network for ether your personal information or in order to take down your network. There are many tools for a hacker to use such as Backtrack Five, Password Crackers, and Nessus scans. These tools help them exploit your network and make it so they have a back door into your network. If the hacker is good, they can be in and out without the network administrator ever knowing because they are good at "covering" there tracks per say. We all have heard that hackers are bad and they were right! They are bad because they get into your network, sit there, take the information they need to take about your business or shut you down, and then leave. "Then how are they good?" You might be asking. Well simple, the tools they use are free for them thus meaning they are free to you too. You can use the tools to check your own network and find holes and fix them. To stop a hacker it's all

...

...

Download as:   txt (6.4 Kb)   pdf (91.7 Kb)   docx (11 Kb)  
Continue for 4 more pages »
Only available on AllBestEssays.com