A01 chaf6542 06 se fm indd



Download 29,46 Mb.
Pdf ko'rish
bet1203/1447
Sana15.08.2021
Hajmi29,46 Mb.
#148217
1   ...   1199   1200   1201   1202   1203   1204   1205   1206   ...   1447
Bog'liq
[Chaffey, Dave] Digital business and E-commerce 2nd book

Social engineering

Exploiting human 

behaviour to gain 

access to computer 

security information from 

employees or individuals.

M11_CHAF6542_06_SE_C11.indd   587

7/23/14   1:27 PM




588

Part 3  Implementation

Computer systems can also be protected by limiting access at the point the external net-

work enters the company. 

Firewalls

 are essential to prevent outside access to confidential 

company information, particularly where an extranet has been set up. Firewall software can 

then be configured to only accept links from trusted domains representing other offices in 

the company.

Measures must also be put in place to stop access to systems through published security 

vulnerabilities. The BBC (2003) reported that in 2003 there were 5,500 security vulnerabili-

ties that could be used. A policy on updating operating systems and other software with the 

latest versions is also required. It is not practical to make all updates, but new vulnerabilities 

must be monitored and patches applied to the  highest-  risk categories. This is a specialist 

task and is often outsourced. TruSecure (

www.trusecure.com

) is an example of a special-

ist company that monitors security vulnerabilities and advises organisations on prevention. 

They also employ a team of people who attempt to infiltrate hacker groups to determine 

the latest techniques. TruSecure gave the FBI over 200 documents about the ‘Melissa’ virus 

author. Although they did not know his real name, they knew his three aliases and had built 

a detailed profile of him. ‘



Ethical hackers

’ are former hackers who now apply their skills to 

test the vulnerabilities of existing systems.

Sometimes ‘ low-  tech’ techniques can be used too. The Guardian (2003) reported cases 

where criminals had impersonated  call-  centre staff in order to gain access to customer 

accounts!




Download 29,46 Mb.

Do'stlaringiz bilan baham:
1   ...   1199   1200   1201   1202   1203   1204   1205   1206   ...   1447




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©www.hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish