Monday, June 10, 2019
Security Essay Example | Topics and Well Written Essays - 1000 words
Security - Essay ExampleThis is majorly done through passwords without unfaltering authentication. Some of the major security concerns related to passwords include phising, re make use of and the use of easy to guess passwords. Malware infection is also a major challenge to the use of passwords realized in many situations. In light of these challenges, authentication is because very critical and this can be achieved through two-step tick. Google has introduced a verification feature called 2sv. In using the verification, one logs into the Google account and after the normal username and password process they are required to submit a six shape verification which might be sent to them through a phone text message. This feature also allows for revocation of the trusted computers. The major strength of the report lies in the fact that it vividly provides much lucid information on the kind of security threats realized on Google and how users should identify them. In the same way, it presents a solution to this challenge while providing its benefits effectively. However, the paper does not provide clarity on the smell of Service Accounts and Delegation. In addition, the paper is weak on the aspect of Service Side technology especially in relation to certificate transparency. 2) The quote card fraud seen in the notice is a typical subject of a cybercrime. Conventionally, cybercrime takes many forms and many of these criminals seek ways and means of illegally obtaining money online. Considering that trust cards are normally used online in devising payments, they are certainly vulnerable to cyber criminals. As seen in the case, many of the criminals usually create a series of false identities through which they create several credit cards. Such credit cards are the pumped up with money from credit bureaus. Others create sham companies which are then used to provide the credit bureaus with false information on the credit worthiness of the credit card owners who are actually false identities. The fraudsters also use a tradelines which are sable market businesses used in committing fraud. It is therefore realized that the credit card fraud seen in the notice is indeed an aspect of cybercrime. On the other hand, the nature of the frauds as realized in the case might raise several questions on the aspect of general security and not just cyber security. It is seen that it was not single the virtual world that mattered in the commission of the crime but even real organizations which were not much protected from such scams. The case can therefore be viewed as a typical case of bank fraud as opposed to cybercrime. More importantly, the case can be viewed on the post of credit card security and can therefore be addressed by increased security from the credit card providers. 3) The Identity Ecosystem as postulated in the report is a kind of online purlieu where organizations and individuals will work together on trust and follow a set of agree d-upon standards. Each of these parties will be able to authenticate and identify their digital identities. This Ecosystem is basically intended to offer stronger identification while protecting the identity of the parties within. Indeed, it is important to note that such an environment might be a challenge to realize in the actual sense. Considering that it basically relies on trust between the organizations and the individuals, it is almost difficult for every caller to follow the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.