Cis505

Submitted by: Submitted by

Views: 148

Words: 788

Pages: 4

Category: Business and Industry

Date Submitted: 11/21/2013 01:22 PM

Report This Essay

I

Abstract

Risks exist in all aspects of the Internet, as well as the business operations that depend on it.

These risks include malicious code, disruptions caused by coding error, natural disasters that

Have major impacts on vital Internet hubs, and attacks by terrorists or other adversaries. The

World Economic Forum estimates a 10 to 20 percent probability of a breakdown of the critical

Information infrastructure in the next 10 years — one of the most likely risks it studied.

Additionally, it estimates the global economic cost at approximately $250 billion, one of the

Largest cost estimates of the risks examined.

Assess the probable difficulties and risks associated with using a public infrastructure such as the Internet as part of a business solution.

Many credit reporting systems that use internet as a mean to transfer credit data is insecure. Security holes can exist in several main parts of the credit reporting system such as data transfer, database, interface and network.

When a user order and receive information, data are transferred through the internet where hackers can listen in and intercept the data if it’s not properly encrypted. Logins, passwords and subscriber codes could also be intercepted by hackers during the transmission of data through the internet.

If the database is not configured correctly, unauthorized employees or customers can hack into the system and access private customer list, subscriber codes, etc. Sharing a single database for all their customers means that a competitor could potentially look at their information.

An insecure interface opens up the system for potential fraud.

Improper network configuration can leave parts of the system vulnerable. Once a component of the system is compromised, hackers can use the newly gained access to their advantage in obtaining access to other parts of the system. A security breach in the system can take it all down.

Security lifecycle for as long as there has been...