Comprehensive Report: Internet Security Threats and Countermeasures

Verified

Added on  2022/12/15

|4
|721
|361
Report
AI Summary
This report examines the ever-evolving landscape of internet security threats, focusing on the discussion between Steve and Leo regarding "Authenticity on The Internet." It highlights the increasing reliance on web applications and the emergence of new vulnerabilities, such as cross-site scripting, which are addressed by new browser APIs like "Trusted Types." The report details specific security updates released by Microsoft and Adobe, including critical vulnerabilities and potential for remote code execution. It also introduces Tor as a tool for anonymous browsing and emphasizes the importance of adopting current security mitigation techniques. The report concludes by underscoring the need for users to stay informed and proactive in protecting their online activities in the face of advancing technology and its associated risks.
Document Page
Running head: INTERNET SECURITY THREAT 1
Internet security threat
Student
Institutional Affiliation
Tutor
Date
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTERNET SECURITY THREAT 2
Internet security threat
The fast pacing internet technology combined with the continuously changing business
environment is an indication that website applications are becoming the way to go in both public
and private organizations. Despite the fact that the websites assures convenience and efficiency,
new security threats that are likely to pose security risks to the organization’s information
systems are emerging. A day hardly pass without a publication on emergence of new security
threat (Sani, Yuan, Jin, Gao, Yu, & Dong, 2019). One publication on the same topic that raised
many eyebrows is “Authenticity on The Internet” (this publication is available podcast transcript
episode #702). Due to the increase in new cyber-security threats and the growth of use of web
applications, information security on the internet should be regarded as one of the management
issue in every organization. The intent of this article is to present a report on the discussion
between Steve and Leo about the authenticity on the internet.
These two gentlemen discusses interesting new technologies that are associated with the
current internet security. They also reviewed interesting twist coming to windows 7 and server
2008 updates. The episode further outlays the emerging new cyber security, hacking of electric
scooters as well as new security initiatives that are yet to be launched by google (Steve & Leo,
2019, April). This security mitigation has been christened “Trusted Types.” The trusted types is a
newly launched browser API that helps in addressing cross site scripting vulnerabilities at their
root cause and in practice. Initially, the cross site scripting have been one of the most dangerous
that has been affecting website applications. The new approach now helps in locking down the
dangerous injection sinks thus reducing vulnerabilities in website applications.
In the first part of the discussion, Steve and Leo take a look at a security threat that is
outstanding and unique in its own kind. This was found on a Tuesday by Microsoft and adobe
Document Page
INTERNET SECURITY THREAT 3
during Tuesday patch. The two gentlemen reports that Microsoft and Adobe released multiple
security updates during the patch that took place on April 2019. Eight mining applications were
pulled out of windows. Moreover, 77 issues were discovered from the system, these
encompassed both windows applications and servers (Steve & Leo, 2019, April). Microsoft
office got tagged with two vulnerabilities that could be used in executing remote codes. Adobe,
on the other hand patched out 71 bugs of which 44 out of 71 were considered critical as reported
by Steve in the discussion. The bugs in adobe could also lead to indiscriminate code execution if
it was not fixed.
As a conclusion, along with the above mentioned innovations and vulnerabilities, Steve
and Leo also shared some insights that are essential for all web users. They shared an interesting
insight about Tor. Many people have been just hearing about Tor nowadays but they are not
entirely sure what it is and what it does (Steve & Leo, 2019, April). Tor enables browsing
websites anonymously, it masks identity by encrypting traffics such that it cannot be traced back.
It can be suggested from the discussion that the advancing technology is becoming a huge threat
to internet security. It is therefore imperative for internet users to adopt the current security
mitigation techniques to reduce the risks.
Document Page
INTERNET SECURITY THREAT 4
References
Sani, A. S., Yuan, D., Jin, J., Gao, L., Yu, S., & Dong, Z. Y. (2019). Cyber security framework
for Internet of Things-based Energy Internet. Future Generation Computer Systems, 93,
849-859.
Steve & Leo. (2019, April). “Authenticity on The Internet.” Podcast. Retrieved on 3rd May 2019
from: < https://www.grc.com/sn/sn-702.pdf>
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]