logo

Internet Security Threat

   

Added on  2022-12-15

4 Pages721 Words361 Views
Running head: INTERNET SECURITY THREAT 1
Internet security threat
Student
Institutional Affiliation
Tutor
Date

INTERNET SECURITY THREAT 2
Internet security threat
The fast pacing internet technology combined with the continuously changing business
environment is an indication that website applications are becoming the way to go in both public
and private organizations. Despite the fact that the websites assures convenience and efficiency,
new security threats that are likely to pose security risks to the organization’s information
systems are emerging. A day hardly pass without a publication on emergence of new security
threat (Sani, Yuan, Jin, Gao, Yu, & Dong, 2019). One publication on the same topic that raised
many eyebrows is “Authenticity on The Internet” (this publication is available podcast transcript
episode #702). Due to the increase in new cyber-security threats and the growth of use of web
applications, information security on the internet should be regarded as one of the management
issue in every organization. The intent of this article is to present a report on the discussion
between Steve and Leo about the authenticity on the internet.
These two gentlemen discusses interesting new technologies that are associated with the
current internet security. They also reviewed interesting twist coming to windows 7 and server
2008 updates. The episode further outlays the emerging new cyber security, hacking of electric
scooters as well as new security initiatives that are yet to be launched by google (Steve & Leo,
2019, April). This security mitigation has been christened “Trusted Types.” The trusted types is a
newly launched browser API that helps in addressing cross site scripting vulnerabilities at their
root cause and in practice. Initially, the cross site scripting have been one of the most dangerous
that has been affecting website applications. The new approach now helps in locking down the
dangerous injection sinks thus reducing vulnerabilities in website applications.
In the first part of the discussion, Steve and Leo take a look at a security threat that is
outstanding and unique in its own kind. This was found on a Tuesday by Microsoft and adobe

End of preview

Want to access all the pages? Upload your documents or become a member.