Monday, May 13, 2019
Computer security Essay Example | Topics and Well Written Essays - 250 words - 1
Computer security - Essay ExampleEvery organization should be cautions to data or sites concerning their web services. Most hackers would normally exercise the illegal exercise to either search for denotation or endorse a basis when vandalizing a high profile site (Lennon, 2012).Oracle senss website was hacked, and words displayed to cause confusion and outcry from the users on the homepage (Lennon, 2012). The practice of hacking led to prosecution and attractive of Razvan in the court of laws. Security countermeasures that might be used to avoid hacking include frequent tilt of passwords and use of latest data protection versions of software. Additionally, hacking can be avoided in the future by educating users somewhat prior changes in the user interface details that might confuse them. Users should only trust ex officio information from Companies websites and not messages that are displayed at the homepages. Hacking is a process that disables normal operation of a website or a webpage. It is an illegal activity performed by individuals who gain access to an individual or organizations website, then deface the crucial features in the webpage. The hacking process leads to users being unable to enjoy the services from the website.The implications of this practice are that other users were able to access the webpage using their mobile phones, but others could not do so using desktop computers. This caused confusing among the users since no prior information or the companys imperativeness had offered disclaimer. Similarly, other services were functioning as usual without any reported cases of vandalism. It appeared that there was also a chance that Oracles web group made an error during update development or site protection (Lennon, 2012). Hacking is not a regular maintenance practice by organizations but a means aimed towards affecting the operations of commonly visited
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.