scroll to top
Stuck on your essay?
Get ideas from this essay and see how your work stacks up
Word Count: 2,500
Database Vulnerabilities I Introduction Computer crime has been defined as Criminal activity directly related to the use of computers specifically illegal trespass into the computer system or database of another manipulation or theft of stored or on-line data or sabotage of equipment and data The purpose of this work is to examine breaches in computer security As a future IT professional with the possibility of being in charge of protecting the security of a database it is relevant to take a hacker approach to security Effective security is no matter where one goes fundamentally the same Successful fundamental security practices are universal crossing all arenas of computer usage whether it is in the nonprofit sector government or for personal use Times change technology moves forward cultures vary from place yet there is no magic bullet that will protect ones system from every possible hack The road to effective security can take many different paths not one right path Organizations with different missions different hardware and different software remain secure not because of a particular version of a firewall or practices is superior but because they use a strategy involving a defense in depth and are prepared for an ever changing computer attack Any business or individual that uses the Internet is attaching its computer system to an immense network This exposes hard drives to intruders and peoples personal behavior to snoopers Security threats increase as computers become more connected with one another and tools that automate attacks make hacking easier In addition as businesses become more dependent on e-commerce there is more to lose II Problem Definition Organizations are falling victim to intrusion through vulnerabilities that exist in their infrastructures and through security holes in software Some common examples involving security breaches as stated by Hack Proofing Your Network Denial-of-Service Information Leakage File Creation Reading Modification Removal Misinformation Special FileDatabase
@Kibin is a lifesaver for my essay right now!!
- Sandra Slivka, student @ UC Berkeley
Wow, this is the best essay help I've ever received!
- Camvu Pham, student @ U of M
If I'd known about @Kibin in college, I would have gotten much more sleep
- Jen Soust, alumni @ UCLA