Sunday, June 16, 2019
Discussions questions Assignment Example | Topics and Well Written Essays - 500 words
Discussions questions - Assignment ExampleLarge enterprises have many employees spread of a lager geographical cover i.e. worldwide who could be difficult to control. These employees could be compromised by hacker so as to provide details to help them hack in the systems. Research shows that most large enterprises hackings are always do from the inside.The greatest fauna that these hackers have at their disposal is Google. Using Google smart search a hacker can get any information they postulate about any individual including family names, credit card information, date of birth, home address, medical records, classified government records etc. Once hackers have access to this contour of information, it is easier for them to carry out any attack ranging from theft, fraud or gain access to restricted resources.Google can also provide information about organizations visibility of web servers, unprotected directories, financial information and database information. This is the kind o f information hackers use to attack there target. Hence Google smart search has become the greatest tool used by hackers.One recent cyber-crime that is on the rise is cloud crime. Cloud computing is trending in IT and most companies are moving to cloud services. indeed with more companies putting information on public cloud services, cloud services have become targets.However system forensics investigators face several challenges in trying to solve the crime. For instance, form the legal dimension, there are no agreements among cloud organizations to enable collaborative investigation. Also majority of SLAs between these companies have no terms and conditions regarding the separation of responsibilities between the cloud service provider and the customerThe greatest challenges facing system forensics investigators is how to retrieve and handle data form ready handheld devices. Revolution in technology has seen emergence of mobile handheld devices like smartphones like Apple iPhone and blackberry, iPads,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.