Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Information Security - Online Essay

Information Security

Sec 405 week 2 assignment 1
Name
Course
Tutor
Date


The computer and internet technology is a pretty good operation environment for business and other daily undertaking. However several millions are lost due various cyber crimes. It is indisputable that every individual would like to avoid being a victim to these computer crimes. There are various categories of computer crime. The most prevalent and disturbing computer crime is the breach of personnel security.

To a large extent, every computer crime is related to personnel security. Ideally, crimes are committed and the same crimes cannot go undetected. In fact, most prevalent cyber crimes being talked about revolve around ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

an attacker can use another person's access credential such as access card to enter areas which are restricted such as server room. It span from a simple singing against someone's name to play back of someone's voice in a voice recognition system.

A typical physical masquerading

Electronic masquerading involves various actions. An example is where a culprit takes the visa card of and individual and demands for the authentication credential. He will then use this to withdraw cash from the ATM machines. Another example is where an employee in a bank steal his fellow employee's login, then use it to access the system then make fund transfer. The owner of that credentials will suffer without knowing the culprit since this attack also originate from inside the organization and hence difficult to detect.

Another way which the one becomes a victim to masquerading is when the system's access control list is weak or wrongly configured. This gives a loop hole to attackers to ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

by competitor firms where they convince the employee of the other competing firm to disclose information that is suppose to the top secret of the company.

* Another breach of personnel security is brute-force attack. This is where someone with an intention of hacking the system tries a large number of usernames and passwords till he get the correct one. In addition, there software that is able to calculate the password by iterating through a very large database of credential details to come up with the correct password. Some attackers have universal password which crack all other passwords (Theohary, 2010).

Concerning the vulnerability to the breach of personnel security, ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Information Security. (2013, July 15). Retrieved April 18, 2024, from http://www.essayworld.com/essays/Information-Security/102846
"Information Security." Essayworld.com. Essayworld.com, 15 Jul. 2013. Web. 18 Apr. 2024. <http://www.essayworld.com/essays/Information-Security/102846>
"Information Security." Essayworld.com. July 15, 2013. Accessed April 18, 2024. http://www.essayworld.com/essays/Information-Security/102846.
"Information Security." Essayworld.com. July 15, 2013. Accessed April 18, 2024. http://www.essayworld.com/essays/Information-Security/102846.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 7/15/2013 11:00:02 AM
Submitted By: eddy
Category: Technology
Type: Premium Paper
Words: 1288
Pages: 5

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Internet Security
» Online Banking Security
» Information Management
» Computer Security And The Law
» Internet Sequrity
» Economic Espionage
» Network Security
» Beginners Guide To Hack
» COMPUTER CRIME Hackers And Secu...
» Real Estate and Property Manage...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved