Computer Security We Have Achieved Essay

Total Length: 1915 words ( 6 double-spaced pages)

Total Sources: 4

Page 1 of 6

This particular instance was significant as the attackers used a generic approach instead of a site specific or application specific exploitation by devising tools that used the web search engines to identify ASP applications that are vulnerable. SQL injection attack was used to propagate the malicious code that exploited zero day vulnerability in Microsoft Internet explorer last year. [Symantec, (2009 ) pg. (47)] the aim of the attackers employing this kind of a generic attack is to exploit the trust of visitors of a website that is usually known to be safe and secure. More recent attack involving a web application was the zero-day attack that exploited multiple vulnerabilities in Adobe Flash Player. [Kaspersky Lab, 2009]

Conclusion

There is a clear change in the computer security scenario. Cybercriminals do not just do it for fun or fame anymore but are getting more professional and monetizing their skills in the underground economy. Phishing, identity theft and stealing of valuable personal and financial information would continue to be a major nuisance in the coming years.
A new form of attack using seemingly safe data files such as PDFs, media files, etc., will become more common in the coming years as criminals are employing different obfuscation techniques to evade AV detection. There will be more attacks on webkit-based browsers that are used in mobile Internet devices such as iphones. Web browsers will continue to be the most targeted software for attacks as these are the most used agents for almost all Internet related applications. As always, prevention is better than cure. Even a common sense approach such as logging in as a user instead of administrator ("principle of least privilege') would limit the extent of damage to a great extent. Updating antivirus software, operating system and other software regularly and using sensible precautions such as regular backups would certainly eliminate the risk or atleast minimize the damage of a malware attack......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Computer Security We Have Achieved" (2009, October 31) Retrieved April 29, 2024, from
https://www.aceyourpaper.com/essays/computer-security-achieved-18043

Latest MLA Format (8th edition)

Copy Reference
"Computer Security We Have Achieved" 31 October 2009. Web.29 April. 2024. <
https://www.aceyourpaper.com/essays/computer-security-achieved-18043>

Latest Chicago Format (16th edition)

Copy Reference
"Computer Security We Have Achieved", 31 October 2009, Accessed.29 April. 2024,
https://www.aceyourpaper.com/essays/computer-security-achieved-18043