Wednesday, June 19, 2019

IT security threats Research Paper Example | Topics and Well Written Essays - 250 words

IT security threats - Research Paper Exampleand controls and has less privileged access to users of the sensitive instruction systems (Silowash, Cappelli, Moore, Trzeciak, Shimeall and Flynn, 2012).The other threat to information technology is the threat of character reference card fraud which leads to unauthorized use of a identification card (Turban and Volonino, 2011). Some of the potential solutions includes avoiding to give out the credit card but rather opt to enter the credit card chassis on a secure online order, avoiding to disclose credit card number and other details on websites that are not secure or on emails, avoiding to leave the credit cards and other receipts that contain the credit card details lying around or even writing of PIN number where it can be easily found (http//www.scambusters.org/CreditCardFraud.html).Other than the to a higher place two threats, Microsoft provides other threats like spoofing and tampering mainly conducted by cyber criminals and spi es. In order to prevent or stop these threats, installing backups regularly, coming up with more(prenominal) tough and complicated configurations that will not be easily broken into and installing firewalls are some of the basic security precautions people and organizations should make (Springer, 2010).Silowash, G., Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T. and Flynn, L. (2012). common land Sense Guide to Mitigating Insider Threats, 4th Edition (CMU/SEI-2012-TR-012). Retrieved January 24, 2013, from the Software Engineering Institute, Carnegie Mellon University website

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.