.

Friday, June 14, 2019

ITEC 9 activity Assignment Example | Topics and Well Written Essays - 250 words

ITEC 9 activity - Assignment ExampleThe essay will explain about wiz of the many known security breaches.There are various security breaches, which needs to be understood for one to be able to secure a computer system. One of the main security breaches includes bodily breach. Physical breach regards the physical theft of equipments or documents that contains cardholder account data like files, cardholder receipt, and point of sale terminals or personal computers. The second type of breach is the electronic breach. Electronic breach denotes the deliberate attack or unauthorized access on a network or system environment where the cardholder data is stored, processed or transmitted. Electronic breach is as the result of gaining access through web sites or web servers to a vulnerable system via application level attacks. The final attack is Skimming. Skimming is the recording or capture of magnetic card lash data with the use of an external device that is sometimes installed on the c ustomers system point of sale. The data obtained from skimming is used in the conciliate of counterfeit debit and credit cards (Roebuck, 2012).Electronic breach is the common security breach as a result of the increased internet access. However, on that point are steps that can be used to prevent from electronic breach. The various ways of preventing from electronic breach includes the use of a secure database or web server. The use of secure database or web servers guarantees that all system, including database and web servers are regularly modernized with the present merchant security patches (Roebuck, 2012). The use of a strong, up-to-date anti-spyware or antivirus and anti-malware software is a way of preventing the security breach. Users should also use passwords that are not easily guessed to prevent from unauthorized persons (Dark, 2011). One of the physical security breaches that hit the news was the white house attack, which can be accessed via www.youtube.com/watch?v=WPU 3ia7Zaog

No comments:

Post a Comment