Hacking lost the information and important data about


HackingHackers are people that can gainaccess to a secure network without authorisation from the company. When thehacker has gained access to the network they then can do a variety of thingsthey are not supposed to do.   They canchange the website and steal information. The hacker can change the informationto trick the customer in to giving them the information instead of a company.If this happens the site will be required to shut down until the site is fixedand the damage done is fixed.  If thesite has to shut down this can result in a loss of money for their business andprofit could drop. Furthermore if there is an information leak this could harmthe reputation of the business because the system will have lost theinformation and important data about their customers.

However they can avoidand prevent hackers by using and consistently updating the system and usingsoftware like firewall and antivirus. MalwareMalware is a type of malicioussoftware. This is a type of software that is made to damage a computer or gainaccess to a computer without the owner of the computer knowing. Some malwaremay include Virus, Adware, and Spyware. This can result in the loss ofimportant files on the device and your personal information can be stolen.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Virus:A virus can be attached to file thatmay be on your computer or it can be in an email from somebody you might notknow with a document attached to it which can contain a virus. A virus is acomputer code that is precisely made to access unauthorised access to a systemscomputer files. Once the virus is inside the computer it can access the filesand infect it. The virus can be destructive because it can change and deletefiles and documents and there is no way of stopping it.  MacroVirusThe main risk to a macro virus is thatis has the ability to spread fast. Once the macro virus is run all thedocuments can become infected.

The virus is designed to delete files orcompromise data that is stored on the computer. Also the macro virus can besent through an e-mail or stored on a disk or a USB.  If a company has a macro virus in the systemit can be very damaging because the macro virus can damage the system bydamaging the files that can contain sensitive customer information and if they loseit the reputation of the company can go down.TrojanThe Trojan virus can disguise itselfas a friendly program that can improve your computer however it is and can bevery destructive the effects of the Trojan will vary with all being damaging tothe computer. One programme in Trojan can be key logging. This can register thenumbers and letters you press on the computer and will give that information tothe hacker.

For example when you login to your bank account the hacker can seewhat you type on the computer and use that information to login to youraccount. Furthermore another programme in the Trojan is data corruption whichcan cause the operating system to crash. Another programme that a Trojan has isremote access, this can be the most damaging, and this gives the hacker theability to access your computer and personal files from their computer whichthen can change and delete the files. If a Trojan infects a company this can bevery damaging to the computer and all the files they have on the customers.

Thehacker could steal the information and use it for them self or they couldaccess the computer using the remote access and change various data. WormA computer worm is a program that duplicates itself and makes gooduse of a PC’s system availability to transfer a duplicate of itself todifferent computers inside that system. It can do this with no contributionfrom the person that owns the computer.

Worms are very similar to viruses inthat they don’t require a host program to run, yet like viruses, they quiteoften can damage the computer. Running an anti-virus program can erase theworm, and updating your operating system will fix and get rid of any holes thatthe worm may rely on to return and access your computer again. If a company hasa worm in the system this can be very damaging to the system because it will beable to spread to every computer in the company’s network which then cancorrupt the files and documents.IdentityTheftIdentity theft happens when a personor a person’s personal computer is hacked. Identity theft includes a hackeraccessing the data that is unauthorised to them and stealing the identity ofthat person. If a business like a bank was hacked and all the details of theircustomers was stolen the person will be able to take money out of the stolenaccounts. This will effect both the business and the person because the personwill be lousing the money and the banks reputation will go down which mayresult people going to a rival company which can mean they go out of business.The best way to stop a hacker is to always and regularly update the informationand change the way people access their information for example biometrics withthings like fingerprint or Iris scan.

  DOS/DDOSA DOS attack is an attempt to overloadwebsite with movement. The objective is to upset the site or system so as toprevent real clients from getting to the administration. The DOS attack isgenerally propelled from a solitary machine.

DDOS attack are ordinarily moreterrible than DOS attack. They are propelled from numerous PCs. The machinesincluded could number many at least thousands. These machines aren’t altogetherclaimed by the assailant, normally. These machines are typically added to theprogrammer’s system by methods for malware.

A DDOS and a DOS attack can effect abusiness because at first the website will be down and people that may want touse the site may not know what is happening at first they will assume that istheir computer. This can highly effect the business their highest source ofincome is down and this can result in the business lousing profits.     Firewallimpact on performanceA firewall can affect the performanceof information sent to the internet business website as the real informationmust be verified, ensuring it is bound for the right port and does not contain malicioussoftware.  A firewall will work in thebackground with you knowing. It will monitor network traffic that is incomingand outgoing from tour computer. The firewall software will combine and joinwith the computers CPU and take up a certain amount of memory.

For the programmeto run smoothly it will effectively effect the speed of the computer.Furthermore firewalls by verified business like Norton or Microsoft will affectthe system well because they are trusted. There can be badly designed firewallthat may be a Trojan. Also the firewall can affect the speedat which the firewall works with the internet and slow it down because itmonitors what you are doing on the internet and monitors communications.However the slowdown should be unnoticeable except if the firewall works withhigh security.

              Pros and Cons EncryptionHTTPSHTTPS is a protected site thatmakes it very troublesome for web pages and websites to be hacked and accessedby an unauthorised user. This is similar to utilising SSL ensures that importantinformation isn’t sent as plain text which will be easier to read however sentencoded making it difficult to access, this is done by the utilisation of adigital certificate. Websites that utilize HTTPS convention will generally besecure and use numerous security strategies to keep information safe.HTTPS will unfavourably influenceyour site load time. When the site you own has a digital certificate, anadditional step of secure confirmation is added to the procedure of purchase. Becauseof this your site may take a bit longer to load.RSAThis is an alternative way that ane-commerce such as amazon or EBay can reassure the customer that that websiteis safe to use.

RSA is a security algorithm used in digital cryptography. RSA isdifferent from older algorithms because RSA has the ability of allowing digitalsigning as well as advanced encryption for e-commerce systems and high-profile organisationslike HSBC. RSA has both a public key and a private key. The public key is usedfor the encryption and given out to anyone. The private key is used for decryptingand is precisely generated to work simply with the public key that it was madefor and matches with.

The user keeps the private key to themselves and uses it similarto a password to access the contents of an encrypted file this could includethings like important information or documents. RSA is used for various importantreasons because of its ability to allow the users to sign in electronically toaccess their domains and other digital property they may own and also itscapability of providing a strong encryption for websites, servers, and files. A disadvantage of RSA encryptionis the computer has to work very hard to encrypt and decrypt the data. If yourjob involves you needing to work with large amounts of encrypted filesregularly the computer can over heat due to working too hard.  SSLSSL is short for Security SocketLayer.

This is a way of ensuring that customers have a secure internetconnection. SSL can offer an encryption method allowing the site to be a HTTPS.The SSL has its benefits and disadvantages.

The SSL can be attained as acertificate and can authenticate the site it claims to be. For example Applehas a secure site so that customers knows that it is the real company and noone trying to scam them. Lastly by having a SSL you are giving them a guaranteethat the information is honest and valid. The disadvantages is the Performancewhen an exchange is started on a site with SSL authentication, the procedureincludes encryption and decryption of the information transferred.

Throughthis, the connection of the server slows. Furthermore this is a small price topay with a slow connection for extra security.  Anti-MalwareAn immensely vital use of software which might be thedifference between a business prosperity and defeat. Could accelerate webpageperformance toward eliminating the danger of velocity lessening malware.Hostile to malware utilities might back off those site, as verificationstrategies might be set up.

  Essentialfiles might be distinguished concerning illustration. PUP alternately analternate malware kind which in deleted might cause issue. Against malwareutilities must a chance to be continually updated to kill newer dangersFirewallFirewalls come as software and hardware. They are a securitysafety measure that controls what can enter and leave a system, regularly withmore accentuation on what can enter a system and that is the thing thatrepresents the greatest danger. As far as web based business, this is afundamental precautionary measure as it keeps individuals from getting to aprivate system who aren’t approved, which means client’s subtle elements won’tbe spilled.

In any case, firewalls can back off the speed of the server thatyour site is working from, implying that administration might be slower whichcan either discourage potential clients in light of the fact that don’t carefor the holding up times, however could guarantee clients that their points ofinterest are being secured.AuthenticationStrong PasswordsImportant passwords has to beupdated consistently like every month or every 6 months to avoid being hacked. Ifyour password was something linked to you like a birthday or a family name. Astrong password will contain numbers, letters and symbols. Also it is importantto not use the same password for everything. The most used password isPassword1, by having this password it will make it easy for the hacker toaccess your account.

Furthermore most password authentication systems can letyou modify your password as often as you want; because you log in with yourexisting user ID and current password, and then update the password in the settings.However Biometric authentication systems cannot change; they are fixed to yourfingerprints, retinas or other body feature.Logging in with an existing userID and password is easy; if they match the data stored in the website database,the program validates them and gives them access.

Biometric systems are no as reliable;a fingerprint sensor can misread your finger and keep you locked out of thecomputer or blocked if you have injured your finger. Injuries or other changesto the affected body part will affect the authentication system.Having a week password can bedamaging if a hacker guesses it because they will be able to access youraccounts       BiometricsBiometric is a type of security mainlyused for authentication and verifying a person and once verified it will giveaccess to that individual in view of verification of one’s physical attributeswhich are stored in a biometric security system. Biometric incorporate uniquefeatures of a human body with things like a fingerprint, iris and retina scanand facial scan.Fingerprint is a type of scanthat reads the grooves of your finger.

The scan is very secure, it can be usedto unlock safes and phones. They are faster and easier to set up. Also I italmost impossible that somebody will have an identical fingerprint or it isnear to impossible to replicate a fingerprint.  Furthermore hackers are professionals in finding out information andpersonal passwords to access a computer but the fingerprint allows anotherlayer of security to protect information.

  However the fingerprintbiometrics scanner has its downside. If the finger that is usually scanned isinjured even if it is temporary it can mess up and obstruct the scanner.  Since the finger is injured the scanningprocess will take longer because it does not recognise the finger.  Also a high security scanner may require veryexpensive computer software and hard were to get the programme running at thebest. The iris is one of the mostunique organs of the human body. Every iris is different no one has the sameiris not even identical twins.  Iris-scanning is not obstructive as there isno direct contact between the iris and the scanner. It is not painful because itdoes not use any laser technology, it is just simply video technology.

It hasno trouble in registering people that wear glasses or contact lenses. The accuracyof the scan is a beneficial with error rates being quite low, which results ina dependable and trustworthy system for verification. The camera that is used in the procedurealways has to have the right amount of light. Without this, it I will be verydifficult to scan an accurate image of the iris. Along with the lack of light arisesthe problem with reflective surfaces like a mirror close to the camera as thiscould reflect in to the camera and make it difficult to scan the iris. All ofthese impact the ability of the camera to capture an accurate image. RSA Secure IDTwo-factor authentication is whenyou protect an account with two factors. A factor is either password, phone, fingerprint.

To truly be protected by two-factor authentication, your account must requiretwo locks before you can access it. When creating an account on a site, youhave to answer security questions and set answers for each one. When logginginto that account (e.

g. bank account), you have to provide the correct answerto each question to authenticate that you have rightful access and it is you.The security questions are easyand quick to set up. The website you are signing up for provides a dropdownmenu of questions for you to answer and all you have to do is pick one and givethe answer. You don’t need any other equipment all you need to do is rememberit.

However a down side to this is many security question answers can be foundin records like your mother’s maiden name or your first pet’s name. To avoidthis, you can make up your answer although it will be hard to remember or makea second password. Furthermore when creating an account they willask for your phone number and when you want to login to the account you createdthe service will send you an message with a verification code that will expirewithin 10-15 minutes. Most of the time it will automatically put the code in ifyou are using your phone.  An advantageis SMS messages are convenient. Today almost everyone has a phone that is a SMS-capabledevice and can receive SMS messages free of charge.

Generally the messagesarrive instantly or a couple of seconds after you have created your account.Also if your device is stolen or misplaced you can lock if form another device.A down side is you have to have trust that the company does not share yourphone number with other people

x

Hi!
I'm William!

Would you like to get a custom essay? How about receiving a customized one?

Check it out