Thursday, November 21, 2019
Why are passwords and other good information security technologies Essay
Why are passwords and other good information security technologies compromised by the people who use them What can we do to improve their contribution to information security - Essay Example Password attacks can be implemented by means of numerous diverse techniques, involving Trojan horse programs, brute-force attacks, packet sniffers and IP spoofing. While IP spoofing and packet sniffers are able to produce user accounts and passwords, password harasses usually refer to frequent efforts to recognize an user account and password; these repeated cracks are called brute-force attacks (Johnson, 2007). By means of the term information security we recognize an intellect of possible risks implicated in the sensitivity of the information. With information technologies coming into the view the image broadens its limits. At this instant it turns out to be essential to recognize the nature of hazard involved and next there should be a well-formulated description of the term safety itself (Rantasaari et al, 2003). In broad sense, there are necessarily three sides of the term security. Primarily, it shows the accessibility of assets, though material or virtual, that is beneath possession of an entity or grouping. Secondly, there is a sense of privacy involved in this practice in view to these assets, in this case data, dealings and communication. Third and as a final point, there should be an awareness of truthfulness which allows the user or users to consider in the context of security (Goldwasser et al, 2007). Here I will explain how passwords and other good information security technologies compromised by the people who use them. The first factor that usually causes the security leak is the sharing of the password by the people with anyone for any purpose. Passwords should not be shared with anyone because it can be casuse of information and data theaft and there is danger of accessing another individualââ¬â¢s protected resources, accounts and personal records. Anothre reason is not changing the passwords periodically. If we do not
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.