Submitted by: Submitted by kantehba270
Views: 325
Words: 1481
Pages: 6
Category: Other Topics
Date Submitted: 04/28/2013 06:02 AM
xxxxxxx
xxxxxx
xxxxxxxxxxx
xxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxx
xxxxxxxxxxxxxx University
Abstract
Our research paper will explore the vulnerabilities and safeguards. Online users are faced with multitude of problems and issues. A typical online user is vulnerable to virus, worms, bugs, Trojan horses and other malwares. Users also exposed to spoofing their private sessions, and to phishing of financial information. It is a common concern for private data being constantly subjected to invasion of privacy with the multitude of spy ware available for monitoring their surfing on the internet. If this is not all, users are also subjected to malwares that stop or totally destroy their machines render them helpless. Web server application attacks are common in today’s digital information sharing age. Understanding their implications, vulnerabilities, and safeguards is paramount as our demands on e-Commerce and the Internet use have increased exponentially
How Do Breaches Occur?
In order to understand how data breaches occur, one should understand why data breaches happen. The data gathered from Verizon Business Risk Team and the Open Security Foundation, reveals three main types as the following:
1. Well-meaning insiders
2. Targeted attacks
3. Malicious Insiders
Incidents involving hacking and malware were both up considerably last year to previous years, and with hacking linked to almost all compromised records. This makes sense, as these threat actions remain the favored tools of external agents, who, as described above, were behind most breaches. Many attacks continue to thwart or circumvent authentication by combining stolen or guessed credentials (to gain access) with backdoors (to retain access).
Five Major Trends:
1. Utilized some form of hacking
2. Incorporated malware
3. Involved physical attacks
4. Employed social tactics
5. Resulted from privilege misuse
Data Breach Reports:...