internet & computer security


DevX Home    Today's Headlines   Articles Archive   Tip Bank   Forums   

Results 1 to 2 of 2

Thread: internet & computer security

Hybrid View

  1. #1
    Lily Chee Guest

    internet & computer security


    I need your answer very much since I encountered the following problem
    in my company now.

    Q1. Pretend you are the CEO of a large insurance company with thousands
    of clients. Many of your clients are required to share with you
    information about their possessions, their salaries, and their
    various health risks. Obviously, your customers trust that you
    will keep this information confidential.
    A large part of your business is built on the trust
    you have established with your customers and your good name.
    Many companies have survived on their good names alone.
    Now, say that you discover that hackers broke into your system,
    compromised some accounts, stole some information,
    and deleted some important records. What do you do?

    Q2. Let say, The insurance company you work for has added 40 new servers
    to
    the company intranet in the last three months. Still your boss
    is unconvinced. She doesn't understand what the fuss is all about.
    She feels that if your department were to post some of its information

    on the intranet that other departments will stop calling and stopping
    by for information. She says she would rather just say no to the
    "revolution" What arguments can you come up with for your department
    putting information on the intranet? Assume that your department
    is administrative in nature, for example, the accounting department.


    3. Attacks against integrity are malicious modification of data, programs,

    messages, and memory. They are the most devastating in that successful

    integrity attacks enable all the other classes of attack.
    Please tell me more details about the threats on the web.

  2. #2
    Michael Howard Guest

    Re: internet & computer security


    Q1: report the incident to the approp agencies.
    Q2: I'm not sure i understand the question.
    Q3: Read my article on Threat Analysis.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
HTML5 Development Center
 
 
FAQ
Latest Articles
Java
.NET
XML
Database
Enterprise
Questions? Contact us.
C++
Web Development
Wireless
Latest Tips
Open Source


   Development Centers

   -- Android Development Center
   -- Cloud Development Project Center
   -- HTML5 Development Center
   -- Windows Mobile Development Center