logo

One-Time Password Security in Mobile Applications

   

Added on  2020-05-04

14 Pages2907 Words48 Views
 | 
 | 
 | 
Standards, Ethics and CompliancePreventative Approaches to Hacking InformationTechnologyPage | 1
One-Time Password Security in Mobile Applications_1

Standards, Ethics and ComplianceTable of ContentsAbstract............................................................................................................................................2Background......................................................................................................................................3What is the Issue?........................................................................................................................3Why Hacking is a Threat?............................................................................................................3Aim of Study....................................................................................................................................5What is available to protect against Hacking?............................................................................5Literature Review about Current Software Solution.......................................................................6Conclusion.......................................................................................................................................8References........................................................................................................................................9Page | 2
One-Time Password Security in Mobile Applications_2

Standards, Ethics and ComplianceAbstractThis report is about preventative techniques to hacking information technology. Hacking has become a serious issue for IT users. From past many years, several cases of hacking attacks haveencountered by business organizations and other users. Hackers are attracting towards information technology to fulfill their purposes of profit, information gathering and to assess weaknesses of system to obtain important information from it. To achieve this goal, different types of hacking and virus attacks are executed by hackers and these attacks are so much harmfulfor computer systems, databases and networks. This attacks cause heavy loss of confidential information of users. DDoS, ransomware and identity theft are some commonly encountered virus attacks. The large business organizations that are using IT applications such as eBay, Sony and others have already faced hacking attacks and these attacks are not yet recovered properly. Therefore, it is necessary to get prevention from hacking information technology. It can be possible with the help of IT developers and by using appropriate security techniques. In this report, I will emphasize on some prevention approaches for hacking information technology. Before discussing about prevention methods to hacking information technology, it is essential to emphasize on background of this topic. From background it will be easier to understand that howhacking has come into existence. Besides, background and prevention approaches of hacking, another essential topics to discuss are issue of hacking in IT, why it is a threat and literature review about appropriate software solution that can be used as a prevention approach. Page | 3
One-Time Password Security in Mobile Applications_3

Standards, Ethics and ComplianceBackgroundThe relation of hacking and IT is as old as they are. It has been more than a century in occurrence of hackers. From early 19th century, issue of hacking was encountered by IT users (Information Technology Law, 2017). In old days, hacking was done in very common ways by sending small harmful programing scripts to users’ computer, through virus attack and by using floppy disks frequently on different computers to spread virus. These all methods had potential to violate system security. Now, the area of hacking has become wider and causes different issues that I will discuss in segment of this report. What is the Issue?Hacking has been implementing for last many years and it is a way to illegally access information from computers without taking permission from its owner. In case of IT, hacking is related to unauthorized access of systems and networks to get confidential information from them (Advocatekhoj.com, 2017). To implement this approach malware and other virus attacks are implemented. The main issue here is that hacking can cause high level damages to the networks, computing devices and some other losses of finance, information and reputation of users (Ncsl.org, 2017). Why Hacking is a Threat?Besides this, hacking is always considered as a big threat for users of information technology. There are several reasons that why hacking is a threat for IT that are listed as below (Itstillworks.com, 2017):Causing System Malfunctions It is one of the main reasons that hacking is considered as a threat. Hackers spread virus into system by using harmful executable programming scripts. This virus causes problems in Page | 4
One-Time Password Security in Mobile Applications_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents