Pages

Subscribe:

Saturday, April 13, 2013

This essay is about secruity risk List four possible security risks that the bank and the clients are facing in the present network setup. Explain clearly why these security risks exist.

Question 1

a.         List four (4) possible protective cover system risks that the bank and the clients atomic number 18 facing in the contribute intercommunicate setup. Explain distinctly why these security department risks exist.

There are 4 possible security risks that the bank and the clients are facing in the present network setup.

Firstly, at that place whitethorn be a possible security risk of interception occurs. Interception means that unauthorized society run into feeler to an asset. Because client send their transaction selective information which contains personal and raw data to the banks Web waiter through the Internet. Without any security measures to protect the data, these data will easily been accessed by somebody.

Secondly, in that location will be modification of data occurs in the present network setup. Modification means the unauthorized party gain access to an asset and tampers with the asset. In the present network setup, there is no security measure to ensure that unauthorized party cannot gain access to the data and tempers with the data. For example, unauthorized party whitethorn access to the transaction data and modify the content. Modification of data would occur between the communication of the client and the banks web server and the banks internal network.

Thirdly, there may be a hatchway of Denial of service occurs.

Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.

A denial of service effort is used by an individual to destroy, shutdown, or degrade a computer or network resource. The goal of such gusts is to alluvial sediment the communication ports and memory buffers of the targeted site to prevent the receipt of legalize messages and the service of legitimate requests for connections. A denial of service attack might be used to bring down a server that a hacker hopes to spoof. For example, a hacker may attempt to spoof the bank in order to accomplish PINs or credit card numbers.

Finally, there may be...

If you want to get a full essay, order it on our website: Orderessay



If you want to get a full information about our service, visit our page: How it works.

0 comments:

Post a Comment

Note: Only a member of this blog may post a comment.