Limited-time discount for students! | Solutions starting at $6 each.

Security expert identifies failure in software, gets into

Added on - 16 Sep 2019

  • 3

    Pages

  • 510

    Words

  • 160

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 1 of 3 pages
Security expert identifies failure insoftware, gets into trouble1.When we discuss the common thing in a part of the cyber world, publicly accessiblewebsites have both advantages and disadvantages. When any of the security experts try to breakin the public network and analyze the flaws of open sites, he can find lots of major concerns withthose open sites. As Patrick Webster did with First State Super, he tried to breach the security ofFirst State. Although the intentions of whistleblower were not bad, he only wants to warn thecompany regarding the security issue of the website. For such, security expert should be listeningabout the issues and overcome those issues by working together will be a better option.2.The open sites of the Internet make it vital for organizations to concentrate on thesecurity of their framework, as organizations move their business operations into the publiclyaccessible networks, they should be cautious with their website security. As we can see in thiscase where First State Security was notified by the Patrick and instead of various notifications,they were not taking this seriously. Information should never be made public as doing that willbe the cyber law and any individual doing that will be treated under cybercrime act. Instead ofmaking information public, same can be notified to the cyber crime team.3.Sadly, retaliation against the security experts who blow the whistle on the issues ofdigital security is exceptionally normal. However, there are state and government laws that givelegitimate security and financial motivating forces for Digital Whistleblowers or cyber experts.The CyberSecurity Whistleblower Protection Manual gives them subtle elements on keylegitimate cases and government Whistleblower Award programs that might be accessible toyou. These programs will not only help these cyber experts in finding the vulnerability in the
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document