Saturday, May 9, 2009

MidtermQuestion#3

Internet if properly maximized can be used as a medium to the advantage of the company. However, risks and threats are there. Thus, research the following:

1. Question#1:Identify the possible risks and threats (eg. virus) that can potentially attack a company with internet connection.
Answer:Internet Worms this is autonomous virtual viruses spreading across the net
2. Case research and analysis:

2.Question:a Identify one company that had experienced an attacked from the internet.
Answer:Twitter site company
2.Question:b Describe the attack.
answer:The worm reportedly compromised thousands of accounts.Twitter co-founder B12 stones confirmed that the attacks initially created four accounts to allow the worm to spread specially over the Twitter site early saturday morning.Twitters securely team was pressed into service later that morning,but act before 90 accounts had been compromised by 11.am.Much more intense attacks by the maliciuos worm begun saturday,increasingly the number of the compromised accounts to nearly 100.Later in two fresh attacks the worm hit twitter users.The worm has apparently not acquired passwords,phone numbers or other sensitive information''mostly used for identify theft attacks.
2.Question:c Identify the damages done and the solutions adopted to reverse the damages and to protect the company from future threats.
Answer:The damages done by this worm was apparently not acquired passwords, phone numbers and other sensitive information which is its gives the company wasting of time to their works..the solution to attacks via web application worms and internet worms general is to fix the problem that the worm uses to propagate application walls and assessment tools can be a good start to preventing these kinds of internet attacks,but the real solution is to get the individuals who create software to consider security as a fundamental building block in developing software.

No comments:

Post a Comment