Ask a question from expert

Ask now

PUBLICLY ACCESSIBLE SITE.

3 Pages413 Words174 Views
   

Added on  2019-09-16

PUBLICLY ACCESSIBLE SITE.

   Added on 2019-09-16

BookmarkShareRelated Documents
PUBLICLY ACCESSIBLE SITE1.Similarly to the common thing in a part of the cyber world, publicly accessible websites have both advantages and disadvantages. When any security experts try to break in the public network and analyze the flaws of open sites. He can find lots of major concerns with those open sites. The first major flaw is inaccurate data or false data on which, we can't rely. Next major problem is " Data Theft", as publicly accessible sites can easily hack by the hackers, so there is security concern regarding your data and inputs. So it canbe concluded that data security is one of the major flaws in publicly accessible site.[ CITATION Tay04 \l 1033 ]2.The open sites of the Internet makes it vital for organizations to concentrate on the security of their framework, as organizations move their business operations into the publicly accessible networks, they should be cautious with the goal that they can make certain that there is no trade-off in the information And this information isn't available to any individual who isn't approved to see it. Security Vulnerability Information is provided to the company, if the company is not responding to security alerts, the data shouldn't be made publically without prior information and granting permission.[ CITATION Coh99 \l 1033 ]3.To manage any kind of vulnerability or unauthorized uses on PC security, there ought to be appropriate security mechanism. The Security mechanism is the technique, device or process used to implement the guidelines laid out in the Security Policy. By characterizing "safe" and "non-secure" action in security arrangements, these safety mechanisms can help forestall, identify, and recover any vulnerability. Internet firewall isan excellent tool, which provides full security to company’s data and information in case
PUBLICLY ACCESSIBLE SITE._1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Defense in Web Based Attacks Report 2022
|4
|728
|16

Ethical Hacking: OS Vulnerabilities and Penetration Testing
|12
|2002
|39

Retaliation against security experts who blow the whistle on digital security issues
|3
|510
|358

Cyber Security: Importance, Vulnerabilities, Threats and Protection
|13
|3131
|388

Moral and Ethical Frameworks Concepts
|7
|1023
|69

Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227