Whether the intent be malicious or merely curiosity, people will always try to circumvent barriers. Physical locks have bread lock picks, and so digital barriers have bread hackers. In the new ethereal world of the wired, this common problem has developed a new dimension. Whereas physical security measures for business, banks, and the like is at a more sophisticated level than for home users, the digital security is similar at just about any level. And, because everyone is connected, and its difficult to know what is behind a given IP address, everyone is a target.
Clearly there is a problem, and something needs to be done to make sure the "bad guys" can't get into critical systems. The obvious fix is to write superior software. Unfortunately powerful software is extremely complicated, and even the most valiant efforts to build impenetrable system such as OpenBSD, have fallen short, and require post release patches. Given that holes are inevitable, the next line of defense is for the "good guys" to break systems faster than the "bad guys", and alert the proper people to produce and release patches as fast as possible. Unfortunately, if the details of the exploit are made known, it makes it that much easier for less skilled malicious parties to take advantage of unpatched systems, and therein lies the problem with the solution.
Exploration of this problem is of particular interest to me, as it relates to my current work. The current biggest source of tech support calls at SCU is viruses. Unfortunately, in that group, the largest virus attacks have been though E-Mails that the users must open in order to get infected, which could have ...
... middle of paper ...
...rnegie Mellon University, 2003. <http://www.cert.org/meet_cert/meetcertcc.html>
"Online NewsHour: L0pht on Hackers", PBS, 1998. <"http://www.pbs.org/newshour/bb/cyberspace/jan-june98/l0pht_hackers.html>
Martin, Kelly, "Delivering the 12kb Bomb", SecurityFocus/The Register, 2004. <http://www.theregister.co.uk/content/55/36345.html>
"Limitation on exclusive rights: reverse engineering", U.S. Code : Title 17 : Section 906, 2002. <http://caselaw.lp.findlaw.com/casecode/uscodes/17/chapters/9/sections/section_906.html>
"Reverse Engineering" IEEE, June 2003 <http://www.ieeeusa.org/forum/POSITIONS/reverse.html>
Mishra, Rohan "Reverse Engineering in Japan and the Global Trend Towards Interoperability", Murdoch University Electronic Journal of Law , 1997. Volume 4, Number 2 <http://www.murdoch.edu.au/elaw/issues/v4n2/mishra42.html#n>
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Privacy and Security are very important aspects in regards to computer databases and keeping them safe. Data Privacy is a way to keep your information secure, and keeping your information secure means it’s going to be kept private (vice versa). Information and data privacy is the relationship between gathering and classifying data and technologies while at the same time keeping them private in the context of the organization. While Computer security and IT security are defined as the means of security and how they translate to computers, their network infrastructures, and the data encompassing the databases that store this data and making sure they are kept safe and classified.... [tags: Computer security, Security, Information security]
2293 words (6.6 pages)
- The rapid development of automation processes and penetration of computers in all areas of life have led to a number of specific problems. One of these problems is the need to ensure effective protection of personal information. Different ways to access information, a large number of qualified professionals, the overwhelming use of special technologies in social production allows violators to conduct activities that pose a threat to information security almost any time and anywhere. A special role in this process was played by the emergence of the personal computer in our daily live, which made computers, software and other information technology accessible to the general public.... [tags: Information security, Computer security]
701 words (2 pages)
- Introduction This paper analyzes the social engineering technology and the social engineering tools that are used to test the human element with regard to its capabilities and limitations in the areas of confidentiality, integrity, and availability. The analysis covers Social engineering Toolkits usefulness, cost, and implementation complexity and how its effectiveness can be enhanced. Social engineering are all those activities that are done by a hacker to manipulate that human tendency to trust so as to gain unauthorized access to the valued information that are in the computer system.... [tags: social networking, security, attacks]
1499 words (4.3 pages)
- There are numerous network security devices and tools available to aid in computer network defense, and these tools are often relied upon for protecting against increasingly sophisticated, stealthy, and damaging attacks. When acting alone, the current generation of security devices has an exceedingly difficult time providing an effective defense against such threats, and the situation is particularly grim for targeted or novel attacks. It has been demonstrated that a number of interoperable systems must be implemented to fully protect a network; a strategy known as Defense in Depth.... [tags: Information Technology]
877 words (2.5 pages)
- What are the best practices and standards in your area that you think are important, and why The Human Factor of IT security. Well I have learned one major thing that doesn’t really revolve around the technical aspect as much as it does to the common sense and neglect of the everyday employee. At some point after learning all the tactical technologies and Solutions and requirements of Information Technology it still boils down to 95% of said cyber-attack happen from human error. This is pretty much say half of cyber-attack are a direct cause of some out either having no clue what they are doing so they should not be doing it ,or someone is purposely leaving system running ports open such as... [tags: Problem solving, Team, Security, Collaboration]
920 words (2.6 pages)
- http://forums.iobit.com/forum/iobit-security-software/iobit-security-softwares-general-discussions/other-security-discussions/15251-28-types-of-computer-security-threats-and-risA specialized field in computer system security that involves securing a computer system hardware and software. Security is typically handled by a system administrator who implements the security policy, network software and hardware needed to protect a system and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to resources.... [tags: Computer security, Internet, Password]
1140 words (3.3 pages)
- As an OD consultant for Woodland Security Services there will be a determination about the human resource/organizational difficulties of the business and suggest a strategy that is best suited for the concern. Once the issue has been identified development of a plan will be discussed; documented and afterwards a discussion of how the plan should be implemented to benefit the organization, employees and their customers. Once the organization goes along with the plan improvement will be seen slowly increasing and eventually hitting their projected segment of the market.... [tags: Security guard, Employment, Problem solving]
1490 words (4.3 pages)
- Most of the problems of the United states are related to the economy. One of the major issues facing the country today is social security. The United States was one of the last major industrialized nations to establish a social security system. In 1911, Wisconsin passed the first state workers compensation law to be held constitutional. At that time, most Americans believed the government should not have to care for the aged, disabled or needy. But such attitudes changed during the Great Depression in the 1930's.... [tags: Social Security Essays]
2175 words (6.2 pages)
- Denial of service (DoS)- This type of attack occurs when a hacker overloads a server or network device with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to respond to valid requests. By updating to the latest service pack and applying security patches, you can minimize the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove valuable troubleshooting tools, it can effectively remove the possibility of DoS attacks.... [tags: Cyber-security, Enterprise Security]
3468 words (9.9 pages)
- Formatting Problems The Safety and Security of Students at a University Introduction Our group designed a study to measure violent crimes that occur on University’s campus. We began this study with the benefit being able to be distributed 3 ways: the parents, students, and faculty/staff. The parents would benefit from the results of the study by knowing or gaining a better understanding of how safe the campus of University is. The students would be better equipped with the tools needed to prevent and observe certain crimes from occurring on campus.... [tags: Security]
1123 words (3.2 pages)