Monday, April 22, 2019
Security Essay Example | Topics and Well Written Essays - 1000 words
Security - Essay ExampleThis is majorly done through passwords without strong authentication. Some of the major security concerns related to passwords include phising, re hold and the use of easy to guess passwords. Malware infection is also a major challenge to the use of passwords cognise in many situations. In light of these challenges, authentication is thence very critical and this pot be achieved through two-step verification. Google has introduced a verification feature called 2sv. In using the verification, one logs into the Google account and after the normal username and password process they are required to exact a six digit verification which might be sent to them through a bring forward text message. This feature also allows for revocation of the trusted computers. The major strength of the paper lies in the circumstance that it vividly provides much lucid instruction on the kind of security threats realized on Google and how users should get word them. In the s ame way, it presents a solution to this challenge while providing its benefits effectively. However, the paper does non provide pellucidity on the aspect of Service Accounts and Delegation. In addition, the paper is weak on the aspect of Service array technology especially in relation to certificate transparency. 2) The credit wit fraud seen in the regain is a typical example of a cybercrime. Conventionally, cybercrime takes many forms and many of these criminals seek ways and means of illegally obtaining silver online. Considering that credit cards are normally used online in making payments, they are certainly vulnerable to cyber criminals. As seen in the case, many of the criminals usually create a series of false identities through which they create several credit cards. Such credit cards are the pumped up with money from credit bureaus. Others create sham companies which are then used to provide the credit bureaus with false information on the credit worthiness of the cr edit card owners who are actually false identities. The fraudsters also use a tradelines which are black market businesses used in committing fraud. It is therefore realized that the credit card fraud seen in the notice is indeed an aspect of cybercrime. On the other hand, the nature of the frauds as realized in the case might raise several questions on the aspect of general security and not just cyber security. It is seen that it was not only the virtual world that mattered in the commission of the crime but however real organizations which were not much protected from such scams. The case can therefore be viewed as a typical case of bank fraud as opposed to cybercrime. More importantly, the case can be viewed on the perspective of credit card security and can therefore be turn to by increased security from the credit card providers. 3) The Identity Ecosystem as postulated in the report is a kind of online environment where organizations and individuals will work together on trus t and follow a facility of agreed-upon standards. Each of these parties will be able to authenticate and identify their digital identities. This Ecosystem is basically intended to put up stronger identification while protecting the identity of the parties within. Indeed, it is important to note that such an environment might be a challenge to realize in the actual sense. Considering that it basically relies on trust between the organizations and the individuals, it is near difficult for every party to follow the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.