Verified Document

Computer Security A Second Look Discussion Chapter

Using Perl LWP Library scripting and data harvesting tools, data is quickly collected, aggregated and used to launch a phishing attack with a stunning success rate of 72%. The rapid nature of how this attack was planned and executed shows how lethal from a privacy standpoint phishing can be when based on social network-based data. There is an implied higher level of trust with any e-mail originating from social networks, as it is assumed it is from friends and those a respondent or test subject trusted. The impersonation or spoofing of e-mail addresses also made the communications all the more contextual and believable, a key trait of successful phishing programs. More education is definitely needed, in addition to more effective approaches to blocking personal information on social networks as well. All of these deterrents are secondary to strong education on the threats of phishing however.

The use of images and their relative selection has shown to be highly effective in lab tests yet only somewhat effective in field test work done by Chiasson, Biddle and Oorschot. What is needed is an approach to biometrics that Lenovo and others are using on their laptops, and touch-sensitive screens are doing today on sensitive information in service industries including hotels. The best authentication technologies however take the ease and convenience of access and combined it with the unique identities of the people needing access to the information. The greater the security access protocol or technique and the more tightly it is aligned to the person at a biometric level,…

Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Security: Corporate Security Documentation Suitable for
Words: 5280 Length: 19 Document Type: Essay

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Computer Security Briefly Support Your
Words: 2728 Length: 8 Document Type: Term Paper

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

Computer Security Information Warfare Iw
Words: 5531 Length: 20 Document Type: Research Paper

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Computer Security People, Process and Technology Are
Words: 4780 Length: 15 Document Type: Capstone Project

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now