Tuesday, May 7, 2019

System Security Essay Example | Topics and Well Written Essays - 500 words

System Security - Essay ExampleThe virus attack can tho be possible to a system via removable storage devices (zip drive, jazz drive, and floppy drive) which mean a system can be protected from such attacks if the external removable devices are pre-scanned before its usage.During the rate of flow era of globalization, every LAN is connected to the biggest LAN i.e., net profit one way or the early(a). close to all the financial institutions and government bodies have connected their systems over the internet to give their authorized users an liberalisation of access from any part of the world. On one hand this has alleviated the boundaries between different countries and do communication possible in real-time between two ends of the world but on the other hand it has given an edge to the cyber criminals to breach through the complex systems by finding its loopholes.Due to the nemesis of hacking, none of the national security and financial data is safe from these cyber criminal s unless well protected by utilize different pro-active techniques such as 1) Data encryption 2) Firewalls 3) Identifying the loopholes in the current system and creating a touch for it. The encryption technique has been successfully use for data transfer between two ends over the internet because even if the data is tapped by a hacker, he cannot decrypt it since he is inaccessible to the public mainstay for decryption. The firewall softwares are used to guard against the brute force attacks and access from an invalid domain but collectible to the loopholes which exist in the current operating systems these firewall softwares occasionally fail.Up till now the hackers are commonly focusing on financial institutions for the monetary benefits, but in the future these hackers could also be used to manipulate the national security data and the private ids to wage any degree of chaos as desired. This situation is expected only because we have created the space for this threat by our selves by storing every personal data and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.