Exploring Security Measures for Publicly Accessible Websites

Verified

Added on  2019/09/16

|3
|413
|174
Report
AI Summary
Document Page
PUBLICLY ACCESSIBLE SITE
1. Similarly to the common thing in a part of the cyber world, publicly accessible websites
have both advantages and disadvantages. When any security experts try to break in the
public network and analyze the flaws of open sites. He can find lots of major concerns
with those open sites. The first major flaw is inaccurate data or false data on which, we
can't rely. Next major problem is " Data Theft", as publicly accessible sites can easily
hack by the hackers, so there is security concern regarding your data and inputs. So it can
be concluded that data security is one of the major flaws in publicly accessible site.
(Taylor, 2004)
2. The open sites of the Internet makes it vital for organizations to concentrate on the
security of their framework, as organizations move their business operations into the
publicly accessible networks, they should be cautious with the goal that they can make
certain that there is no trade-off in the information And this information isn't available to
any individual who isn't approved to see it. Security Vulnerability Information is
provided to the company, if the company is not responding to security alerts, the data
shouldn't be made publically without prior information and granting permission. (Cohen,
1999)
3. To manage any kind of vulnerability or unauthorized uses on PC security, there ought to
be appropriate security mechanism. The Security mechanism is the technique, device or
process used to implement the guidelines laid out in the Security Policy. By
characterizing "safe" and "non-secure" action in security arrangements, these safety
mechanisms can help forestall, identify, and recover any vulnerability. Internet firewall is
an excellent tool, which provides full security to company’s data and information in case
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
of any vulnerability, hacking, malware attack or any kind of virus attacks. Fire provides
options how to deal with these security threats. (Taylor, 2004)
Document Page
References
Cohen, F., 1999. Simulating cyber attacks, defenses, and consequences. Computers & Security,
18(6), pp. 479-518.
Taylor, R. W. E. J. F. a. J. L., 2004. Digital crime and digital terrorism. S.l.: Prentice Hall Press.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]