Censorship Of Service Attacks By Steven Chase Of The Globe And Mail Newspaper
1534 Words7 Pages
While there are many other types of threats, these are some of the most popularly used. Another that should be mentioned however, is distributed denial-of-service attacks. William and Sawyer (2015) mention that these types of attacks encompass the sending of requests to a server or website so many times that real users can no longer access the services provided by the site in question. This type of attack has been used to bring down government websites in the past, such as a recent attack, reported by Steven Chase of The Globe and Mail newspaper, in Canada in June of 2015 by hacktivist group, Anonymous. The group reportedly overloaded numerous Canadian websites causing government employee email systems to cease functionality, along with…show more content… If the software is not up-to-date it will likely not have the most recent security threats in its database to look for when scanning, basically it will just think that an infected file is safe and not catch it, leaving it to continue to threaten and cause the system harm.
• Passwords are another protection measure that most people are very familiar with. Over time, passwords have needed to become more complex to try to keep others, including algorithms, from figuring out your password and hacking your accounts. While passwords are one method of protection, it is not recommended to be the only level of protection utilized to protect data on a computer system.
• Biometric Authentication refers to the usage of software that looks for physical markers to allow access to a system. Some of the most commonly used physical markers are fingerprints, face-recognition, voice-recognition, and iris-recognition (Williams & Sawyer, 2015). As no two humans are exactly alike biometics are less likely to be hacked, although it is not impossible.
• Encyption takes data and transforms it into unreadable jargon until a key is used to unlock or decrypt the data back to its original form. Due to its near infallibility, encryption is one the most best ways to secure data (Williams & Sawyer, 2015).
In 2011, United States Computer Emergency Readiness Team (US-CERT) published a Technical Information Paper (TIP),