Monday, September 23, 2019
Common Software Vulnerabilities', Database Security, and Attacks Essay
Common Software Vulnerabilities', Database Security, and Attacks on Networks discussion - Essay Example Linux has applications from cars to cameras and Raspberry Pi and the bug could be fatal in Android, IBM machines, and Windows (Johnson, 2011). The primary source of the attack emanates from the web where a hacker could manipulate the bug to add malicious code on websites or to funnel information such as health records or bank details (Fogel, 2013). Shellshock allows the intruder to access each internet-powered device in an individualââ¬â¢s home from very innocuous entities such as smart light bulbs. Rated at ten on the severity check, the only solution to the vulnerability is updating devices with patches by the website and server owners to secure their clients. While antivirus and firewalls are the initial defenses for most organizations, they will not to be able to stop the attacker getting in this way and, therefore, must be advised to obtain operating system updates from software vendors. The bug is believed to have been in existence for 25 years, to its discovery by Linuxââ¬â¢s expert Stà ©phane Chazelas. For instance, Apache web server operates Bash in its background in executing tasks such as processing personal data keyed in through online forms. Encryption in databases has worked its way to the top of the priorities list in the current IT sector. Applications and firewalls no longer suffice in protection of data and businesses in the present dayââ¬â¢s complex and open IT environments. Complying with a number of regulations and mitigating the risk are the main drivers forcing database encryption onto the security agenda. However, there are some proposed corrections to the challenge. At the moment, businesses are taken by key management, concerning the largest challenges as database encryption. They are also grappling with matters such as a way to seclude security management and databases, controlled usage, key copying and the means to offer the security auditor proof of secure systems (Cherry, 2011). Governments for are insisting on encryption to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.