.

Tuesday, December 18, 2018

'Computer Virus and Prentice Hall Essay\r'

'Reports of computer security failures appear oft in the daily new. Cite a account failure that exemplified one (or more) of the principles listed in the chapter: easiest penetration, adequate protective cover, effectiveness, weakest link.\r\n at that place has been a lot of reports of security breaches in the news, for type the Sony Playstation Network, RSA Lockheed Martin compromise, Hyundai and so on, these have been of recent and these all testify how vulnerable we be to security threats out on that point on the world wide web which has really little to do with borders of the country or state. The net is a gateway of information all all over the word where people are connected and providing and fascinating information. Many of the security restrictions that apply in a physical sense do not in the cyber world.\r\nI have picked the Sony Playstation Network (PSN) compromise as my topic of discussion to show the areas covered in chapter one that talk about penetration, pro tection, effectiveness, weakest link. A flourishing penetration into the PSN by the attacker, has compromised peoples credit card information, birthdates, addresses, surround numbers and more. The successful penetration was delivered disguised in the form of a purchase as utter by Sony Chief Information Officer Shinji Hajesima (Ogg, 2011).\r\nThe strategys were otiose to detect the attack going through as it went through has a purchase transaction. This show drop of adequate protection, in the article it also mentions that the pic that was exploited by the hacker was also known. This shows that it is absolutely important to make sure that the patches for known vulnerabilities are deployed and the outlines are patched accordingly, though one whitethorn argue if the patching introduces other forms of pic.\r\nThe successful development of the trunk led to the loss of personal lucubrate of up to 70 million (Schreier, 2011) customers, this information could be used for identi ty theft, credit card theft, and in like manner that the down time for customers who are using the system that they have paid for. The effectiveness of this attack is shown by the shutdown of the PSN for a number of days. This shows that the effectiveness of the protection on this system was lacking, the inability to pickup on the intrusion as it happened and thus showing us a weak link in the system security.\r\nThe article shows us the combination of things that have deduce into play that have led to the successful compromise of the PSN network. Starting with the vulnerability that was known by Sony with the systems and left-hand(a) unattended, secondly the inability of the intrusion detection system to pick up the actual attack or the delivery of the malformed information that exploited the vulnerability to permit access to the attacker, lastly the storage of data in an unencrypted but hashed form which is reversible to experience the credentials and personal details of the PSN users or customers.\r\n'

No comments:

Post a Comment