Security Microsoft, Apple, Facebook, and Twitter are among the technology companies that have experienced a series of attacks exploiting security flaws in the Java plug-in for browsers. These security intrusions appear to have originated from hackers in China, Russia, or Eastern Europe who were attempting to obtain the companies’ intellectual property, sensitive data, and users’ personal information. The cyberthieves bypassed Java’s built-in protections and installed malware on the compromised computers Kaspersky Security estimates that more than ­one-half of the security threats can originate from Java flaws. Oracle, the company that develops Java, issues patches to address known security vulnerabilities, but the Department of Homeland Security and other experts recommend not using Java until it is needed in browsers because new attacks may occur in the popular ­programming language. Research This: Locate at least two articles discussing Java security flaws. How do Oracle and other companies inform users about the need to obtain updates to fix security holes? How many devices worldwide have Java installed? How can users discover if Java is installed on their computer or mobile device and, if it is, learn how to uninstall it?

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Chapter9: Operating Systems: Managing, Coordinating, And Monitoring Resources
Section: Chapter Questions
Problem 4IR
icon
Related questions
Question

Security Microsoft, Apple, Facebook, and Twitter are among the technology companies that have experienced a series of attacks exploiting security flaws in the Java plug-in for browsers. These security intrusions appear to have originated from hackers in China, Russia, or Eastern Europe who were attempting to obtain the companies’ intellectual property, sensitive data, and users’ personal information. The cyberthieves bypassed Java’s built-in protections and installed malware on the compromised computers Kaspersky Security estimates that more than ­one-half of the security threats can originate from Java flaws. Oracle, the company that develops Java, issues patches to address known security vulnerabilities, but the Department of Homeland Security and other experts recommend not using Java until it is needed in browsers because new attacks may occur in the popular ­programming language. Research This: Locate at least two articles discussing Java security flaws. How do Oracle and other companies inform users about the need to obtain updates to fix security holes? How many devices worldwide have Java installed? How can users discover if Java is installed on their computer or mobile device and, if it is, learn how to uninstall it?

 

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 3 images

Blurred answer
Knowledge Booster
Networking
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Enhanced Discovering Computers 2017 (Shelly Cashm…
Enhanced Discovering Computers 2017 (Shelly Cashm…
Computer Science
ISBN:
9781305657458
Author:
Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781305971776
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning