Custom term paper on Protection techniques in cases of privacy violations

Employees often do not hesitate to plug flash cards with information stored at home to office computers and vice versa. In this case, being not aware of it themselves, they transfer computer programs stealing most of this data. While home networks have serious holes in security systems, the masses have no adequate understanding of what means are used to get networks secured (Botha and von Solms 5-11). Specialists advise private users not to use untested and untrusted flash drives, disks and other media with recorded information. In addition, experts advise to carefully choose passwords: pet’s nickname or simple sequences of numbers are not suitable for protecting important information. However, these and other tips are rarely followed by users. According to the British company Imperva, three most popular passwords are 123456, 12345 and 123456789. The word “password” occupies the 4th place, followed by the phrase “iloveyou” written together, the password “princess” and “rockyou”. The eighth and ninth places are occupied by number combinations 1234567 and 12345678 (Coffey 80).
The computer hacking trends follow from the logics of IT-technologies development. Malicious programs become more destructive, more multi-direction and more rapid. The consequences become more global in their nature and consequences liquidation management more time-consuming. These processes are accompanied by the criminalization of IT-sphere.
The 21st century is officially declared the century of information technology; so hackers will be used by governments of warring countries in the information wars (Fallows 58-63). Achievements of hacker technologies will be fully used by criminal organizations. The more high technologies will penetrate into human lives, the more demanded hackers will be and the more they will be paid by criminal structures. The more mobile devices (smartphones, PDAs, laptops) will overtake the functions of household personal workstations, the more attacks will be particularly aimed at them. Nowadays, it is already possible to predict the emergence of WAP-sites, implementing phishing attacks (Furnell and Warren 28-34).
Thus, any modern system of preventing attacks does not preclude the attack on the practice; it can only complicate the intrusion process, reduce the variability of a successful attack, protect against accidental attacks of worms and scriptkiddie, and make targeted attacks more expensive. In addition, there is a certain limit of code quality. The protection and detection systems are also computer programs; therefore, they also have holes through which hackers can get control over the system. Thus, in practice, any remedy may be a loophole to the computer system because of its errors; and the more complex the software is, the more holes it has (Furnell and Warren 28-34; Leng 187-89). custom term paper
Nowadays, the creators of anti-virus systems are constantly one step behind virus developers and just work at already existing holes making feeble attempts to prevent new ones. Previously, the emphasis was placed on a reactive approach, i.e. to protect against known threats for which signatures are developed. If there was no signature, it was impossible to detect such an attack. Now the focus has shifted towards a proactive approach and detection of unknown threats. Now this direction is actively developing and will be further developed. But, unfortunately, the fact of possible creation of a virus that will not be 100% detected has long been proved (Fallows 58-63). Therefore, there always remains a chance that the protection system, no matter what methods it may use, will be unable to detect a malicious program. The more effective is the defense against the vulnerabilities, their timely detection and elimination. In this case, many attacks will simply be unrealizable.
The success of the organizations using the achievements of modern information technologies depends largely on the availability of special tools and skills involved in information security. The necessity to protect official data and information from the malicious attacks of hackers, as well as timely response and rapid recovery of damaged or unauthorized data changes encourages the establishment of special departments for the organization of information security and data protection. Employees of this department are to solve the problems of information security and privacy at the pre-preparation stage of protection system: work out the method and assess the security of information flow of organizations, explore hardware and software and assess the degree of security of information flows and the technical means (Botha and von Solms 5-11).

Conclusion
Thus, the main trends in providing privacy and network security from hacker attacks are: increasing of carrying capacity of network security means; refusal from signature methods of detection and applying behavioral ones; extensive use of security event correlation systems; terminal stations protection; multifunction devices release; transition to hardware and software-hardware protection complexes; introduction of epidemics localization technologies (such as Network Admission Control); cheapening of the means of biometric authentication; introduction of two-factor authentication (account + certificate EDS); etc. (Botha and von Solms 5-11).
Probably, in the nearest future protect systems and cryptographic algorithms will appear which will be generally impossible to break. However, they will be really invulnerable for hackers just for a short period of time; it will take several more months or years for some genius to find the key. One thing is obvious; the development of more sophisticated security systems in the next few years will involve huge money and world’s best minds.

Works Cited:

Botha, M., and R. von Solms. “The utilization of trend analysis in the effective monitoring of information security.” Information Management & Computer Security 10.1 (2002): 5-11. Print.
Coffey, Rebecca. “20 things you didn’t know about computer hacking.” Discover 30.10 (2009): 80. Print.
Embar-Saddon, Ayn. “Cyberterrorism: Are We Under Siege?” American Behavioral Scientist 45 (2002): 1033 – 1043. Print.
Fallows, James. “Cyber warriors.” Atlantic Monthly 305.2 (2010): 58-63. Print.
Furnell, S.M., and M.J. Warren. “Computer Hacking and Cyber Terrorism: The Real Threats in the New Millennium?” Computers and Security 18.1 (1999): 28-34.Print.
Leng, T.K. “Unauthorized Access to Computer Data”. Computer Law and Security Report 16.3(2000): 187-189. Print.
Marshall, Patrick. “Cybersecurity: How vulnerable is the U.S. to cyberwarfare?” CQ researcher 13.33 (2003). Web.
Nissenbaum, Helen. “Hackers and the contested ontology of cyberspace.” New Media & Society 6 (2004): 195 – 217. Print.
Reilly, Michael. “Interview: Richard Stallman, one of the founders of “free software”. New Scientist 198.2651 (2008): 42-44. Print.



Author: essay
Professional custom essay writers.

Leave a Reply