Security Architecture: Protecting Digital Diskuss from API Attacks

Verified

Added on  2022/09/08

|4
|507
|18
Essay
AI Summary
This essay addresses the critical need for Digital Diskuss to protect itself from API attacks, which can compromise the entire system. It emphasizes the importance of multi-layered authentication methods to identify and block malicious agents, differentiating them from genuine users and sophisticated human-like robots. The essay highlights that APIs can be vulnerable entry points, stressing the need for robust security measures to prevent unauthorized access and data breaches. By implementing stringent authentication processes and staying vigilant against emerging threats, Digital Diskuss can significantly enhance its security architecture and safeguard sensitive information.
Document Page
Running Header: SECURITY ARCHITECTURE AND DESIGN 1
SECURITY ARCHITECTURE AND DESIGN
NAME
COURSE
INSTITUTION
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SECURITY ARCHITECTURE AND DESIGN 2
How Digital Diskuss should protect itself from an attacker,
An attacker is a skilled personnel who is capable of bringing down the whole system of an
organization through getting access to an API. API allows any programmer to create, install and
use an agent in the system undetected, in any system without controlled entry and security alerts
on threats in the system. Many organizations have reported such cases whereby attackers get
access into their system and create an enormous damage or even steal information in a system.
The vulnerability of a system may be due to its complexity, diversity and concurrency of the
system.
Can Diskus protect itself from such attacks? An answer to this question is definitely yes. An
attacker is easily identifiable in a system, that is, when the system has got several authentication
methods. Business analytics system is the team which is given the mandate to implement all
necessary security measure in the business and they should be very vigilant on the threats the
business is vulnerable to. This team should work to ensure that the system in the organization has
several authentication process which must be followed in order to be granted access some
information from a system. Malicious agents in a system are therefore not authenticated to access
any information and when detected they are blocked immediately before they can find other
ways of cracking into the system (Lamba, 2019).
Another way to avoid and control attacks on the system APIs is by implementing measure which
will differentiate genuine agents from sophisticated human like robots. As a result of constant
improvements in tech sector, there have been several inventions such as use of robots in the tech
industry. These robots are sometimes used to break into a system and therefore the organization
should put those measures which separate genuine agents from the human-like robots
(Mallenahally, 2020).
Document Page
SECURITY ARCHITECTURE AND DESIGN 3
An agent is definitely an attack surface in the system. This is simply because an attacker finds it
easy to use unauthorized entrance into a system and access some information and opts out
unnoticed. This is possible because when the system does not have several authentication steps,
they give direct access to any attacker who has found a way into the system. An attacker may
have also access to another agent’s credentials and use them to access some information in the
organization without any permission from the genuine agent.
Document Page
SECURITY ARCHITECTURE AND DESIGN 4
References
Lamba, A. (2019). API Design Principles & Security Best Practices–Accelerate your business
without compromising security. CYBERNOMICS, 1(3), 21-25.
Mallenahally, G. (2020). U.S. Patent No. 10,579,787. Washington, DC: U.S. Patent and
Trademark Office.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]