Wednesday, May 8, 2019
Security and the Technological Revolution Research Paper
warranter and the Technological Revolution - Research Paper ExampleAccording to Dulles (2014), one of the greatest threats to the certification profession is cybercrime. Security officers are forced to machine new technologies in order to detect whatever malicious attempts of cybercriminals and undertake counteractive measures to avoid exposing citizens to harm. For instance, cybercriminals are currently using sniffer malware to extract password files from their targeted computers therefrom using them to gain unauthorized plan of attack to critical information within organizations system. Therefore, the tribute measure profession has been forced to implement new technology that would enable security officers to curb such kinds of crime. They seduce implemented audit trailing technology that enables them detect the log in details that were used to access information within the system during the time of crime.The report generated after performing audit trailing enables the sec urity officers to identify the possible security loopholes that might have been used by the cybercriminals to perpetrate the crime. Technology has in addition enabled them to track cybercriminals to their exact locations hence making arrests in efforts to curb the vice. The security profession used to award a lot of challenges before establishment of the audit trailing technology because it was hard for them to detect every unauthorized access to organizations information.Moreover, Back-off Malware has been another cyber threat that forced the security profession to implement new technology in efforts to curb it. Back-off is a Malware program that is installed in the Point of Sale (POS) terminals by cybercriminals in order to collect credit card information and transaction data of the users. The malware uses traditional pelf mechanisms to record critical information from customers and using it to initiate transactions without the account owners consent. The
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.