Wednesday, August 7, 2019

Technology Evaluation and Recommendation Essay Example | Topics and Well Written Essays - 750 words - 1

Technology Evaluation and Recommendation - Essay Example Threats on their part can take up multiple flavors ranging from sabotage, deliberate espionage, leakage, or information extortion. As is evident with the virility of information technology as the contemporary means of capturing and storing information, it is important that access control systems should exist to protect information and information technology systems. Access control is one of the most sensitive aspects when it comes to computer and computer systems’ security. Access control refers to any mechanism that controls or provides a form of verification to guarantee information’s protection from inappropriate access or unauthorized use. Collectively, access control methods serve two purposes; controlling modification, and controlling the disclosure of information from threats. In computer security, a threat is any agent that may breach the confidentiality or interfere with the integrity of information or information systems. Threats on their part can take up multiple flavors ranging from sabotage, deliberate espionage, leakage, or information extortion. As is evident with the virility of information technology as the contemporary means of capturing and storing information, it is important that access control systems should exist to protect information and information technology systems. Social engineering occurs when a user is manipulated to trick a person into weakening a component of the system itself. One of the biggest dilemmas with social engineering is the fact that a hacker can obtain critical information via personnel relationships. This can be chaotic and cause many in adverse issues. Another method that plagues the dilemma of social engineering is pretexting. Pretexting occurs when a hacker calls an IT personnel for instance and give scenarios that will allow a hacker to have a perception for hacking. Another risk that seems to be prevalent in user domain accounts that correlated with human mistakes is the fact that it

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.