Wednesday, September 11, 2019
System Security Essay Example | Topics and Well Written Essays - 500 words
System Security - Essay Example The virus attack can only be possible to a system via removable storage devices (zip drive, jazz drive, and floppy drive) which mean a system can be protected from such attacks if the external removable devices are pre-scanned before its usage. During the current era of globalization, every LAN is connected to the biggest LAN i.e., internet one way or the other. Nearly all the financial institutions and government bodies have connected their systems over the internet to give their authorized users an ease of access from any part of the world. On one hand this has alleviated the boundaries between different countries and made communication possible in real-time between two ends of the world but on the other hand it has given an edge to the cyber criminals to breach through the complex systems by finding its loopholes. Due to the threat of hacking, none of the national security and financial data is safe from these cyber criminals unless well protected by using different pro-active techniques such as: 1) Data encryption 2) Firewalls 3) Identifying the loopholes in the current system and creating a patch for it. The encryption technique has been successfully used for data transfer between two ends over the internet because even if the data is tapped by a hacker, he cannot decrypt it since he is inaccessible to the public key for decryption. The firewall softwares are used to guard against the brute force attacks and access from an invalid domain but due to the loopholes which exist in the current operating systems these firewall softwares occasionally fail. Up till now the hackers are usually focusing on financial institutions for the monetary benefits, but in the future these hackers could also be used to manipulate the national security data and the personal ids to wage any degree of chaos as desired. This situation is expected only because we have created the space for this threat by ourselves by storing every personal data and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.