Thursday, July 25, 2019

ITEC 9 activity Assignment Example | Topics and Well Written Essays - 250 words

ITEC 9 activity - Assignment Example The essay will explain about one of the many known security breaches. There are various security breaches, which needs to be understood for one to be able to secure a computer system. One of the main security breaches includes physical breach. Physical breach regards the physical theft of equipments or documents that contains cardholder account data like files, cardholder receipt, and point of sale terminals or personal computers. The second type of breach is the electronic breach. Electronic breach denotes the deliberate attack or unauthorized access on a network or system environment where the cardholder data is stored, processed or transmitted. Electronic breach is as the result of gaining access through web sites or web servers to a vulnerable system via application level attacks. The final attack is Skimming. Skimming is the recording or capture of magnetic card stripe data with the use of an external device that is sometimes installed on the customer’s system point of sale. The data obtained from skimming is used in the manufacture of cou nterfeit debit and credit cards (Roebuck, 2012). Electronic breach is the common security breach as a result of the increased internet access. However, there are steps that can be used to prevent from electronic breach. The various ways of preventing from electronic breach includes the use of a secure database or web server. The use of secure database or web servers guarantees that all system, including database and web servers are regularly modernized with the present merchant security patches (Roebuck, 2012). The use of a strong, up-to-date anti-spyware or antivirus and anti-malware software is a way of preventing the security breach. Users should also use passwords that are not easily guessed to prevent from unauthorized persons (Dark, 2011). One of the physical security breaches that hit the news was the white house attack, which can be accessed via www.youtube.com/watch?v=WPU3ia7Zaog

No comments:

Post a Comment