Exploring Security Measures for Publicly Accessible Websites

Verified

Added on  2019/09/16

|3
|413
|174
Report
AI Summary
This report examines the security concerns associated with publicly accessible websites. It highlights the risks of data theft and vulnerabilities, emphasizing the importance of robust security measures. The report discusses the need for organizations to prioritize the security of their networks and data, ensuring that sensitive information is protected. It introduces security mechanisms, including firewalls, as essential tools for preventing and mitigating cyber attacks. The report also references the work of Cohen (1999) and Taylor (2004) to support its claims about the severity of security threats and the necessity of proactive security practices. It stresses the importance of addressing security alerts promptly and implementing comprehensive security policies to safeguard data.
Document Page
PUBLICLY ACCESSIBLE SITE
1. Similarly to the common thing in a part of the cyber world, publicly accessible websites
have both advantages and disadvantages. When any security experts try to break in the
public network and analyze the flaws of open sites. He can find lots of major concerns
with those open sites. The first major flaw is inaccurate data or false data on which, we
can't rely. Next major problem is " Data Theft", as publicly accessible sites can easily
hack by the hackers, so there is security concern regarding your data and inputs. So it can
be concluded that data security is one of the major flaws in publicly accessible site.
(Taylor, 2004)
2. The open sites of the Internet makes it vital for organizations to concentrate on the
security of their framework, as organizations move their business operations into the
publicly accessible networks, they should be cautious with the goal that they can make
certain that there is no trade-off in the information And this information isn't available to
any individual who isn't approved to see it. Security Vulnerability Information is
provided to the company, if the company is not responding to security alerts, the data
shouldn't be made publically without prior information and granting permission. (Cohen,
1999)
3. To manage any kind of vulnerability or unauthorized uses on PC security, there ought to
be appropriate security mechanism. The Security mechanism is the technique, device or
process used to implement the guidelines laid out in the Security Policy. By
characterizing "safe" and "non-secure" action in security arrangements, these safety
mechanisms can help forestall, identify, and recover any vulnerability. Internet firewall is
an excellent tool, which provides full security to company’s data and information in case
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
of any vulnerability, hacking, malware attack or any kind of virus attacks. Fire provides
options how to deal with these security threats. (Taylor, 2004)
Document Page
References
Cohen, F., 1999. Simulating cyber attacks, defenses, and consequences. Computers & Security,
18(6), pp. 479-518.
Taylor, R. W. E. J. F. a. J. L., 2004. Digital crime and digital terrorism. S.l.: Prentice Hall Press.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]