Security threats and mobile devices

Assignment Help Basic Computer Science
Reference no: EM133181226

Part 1: Security Threats

A Facebook data breach revealed more than 530 million individuals' personal information to hackers. This included the date of birth, user's name, current city, and posts made on their wall. The exposure was discovered in 2021 even though it existed since 2019.

This breach happened when cybercriminals scraped data from Facebook's servers using a misconfiguration in their contact importer. As a result, they could gain access to the personal information of millions of people.

According to (Vojtko How to prevent security misconfiguration) "The most common mistakes that lead to security misconfiguration are: Unnecessary ports being left open, Unneeded services permitted to run, Leftover pages still available to access, and Unused accounts with certain privileges not being deleted."

By not removing these things you are leaving the application open to attacks. A couple of things we can do to prevent Security Misconfiguration are: Remove unused features, Disable the use of default accounts and passwords, and Limit access to administrator interfaces.

Part 2: Mobile devices

A desktop computer is more physically secure than laptops, smartphones, and tablets because it is often kept in one location, making it easier to protect. Desktop's access to internet usually comes from a single source, which help to fight malware easier.

Each one of these items have different practices when it comes to secure your device, these are a few ones that they have in common:

Always run updates, avoid public or suspicious Wi-Fi, enable remote lock, enable user authentication, turn off device when not in use, and restrict physical access to device.

Reference no: EM133181226

Questions Cloud

Implementation phase of organizational transformation : The organization will experience what problems when they fail to engage with employees during the implementation phase of organizational transformation and chan
Primary sources of short-term funds for new business owners : What are the primary sources of short-term funds for new business owners? What are their major sources of long-term funds?
Understanding of the production management function : Operations management function in both manufacturing and service industries and to introduce key issues and techniques in operations management
Implementation of adapted compensation : What three survey questions could I possibly ask employees, regarding my research statement/question?
Security threats and mobile devices : A Facebook data breach revealed more than 530 million individuals' personal information to hackers.
Reflect and research essay : An essay of 1200 between 1500 words that will comprise what you have learned in this course with reference to the qualities of a particular speaker that engages
Establishment of a systems-based risk management program : Consider the possibility of yourself in a new role as a risk manager. Research risk management topics in the Capella Library or other reputable online sources.
Reflect and research essay : Your final assignment for the course is an essay of 1200 - 1500 words that will comprise what you have learned in this course with reference to the qualities of
Carry out the proposed research investigation : Develop research questions or hypothesis with rationale and Evaluate data collection methods and provide a rationale for chosen data collection methods

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Midwest family mutual goes green case study

This is the Midwest Family Mutual Goes Green case study. Managing and Using Information Systems: A Strategic Approach,

  Analyze asymmetric and symmetric encryption

Analyze asymmetric and symmetric encryption.

  The board game scrabble

The board game Scrabble works by assigning points to wooden tiles that are marked with printed letters, and are arranged as interlocking words on a Scrabble board.

  Replacing legacy point-of-sale systems

Why was replacing legacy point-of-sale systems and implementing a data warehouse essential to an information system solution?

  How to divide task among several groups

A single central authority cannot manage to assign Internet addresses fast enough to accommodate the demand. Can you invent a scheme that allows the central.

  Microsoft windows user account control

Discuss how Microsoft Windows User Account Control (UAC) provides a higher level of security for users. Research UAC using the Internet.

  Improper file or directory permissions

Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions,

  Evaluate potential risks within security infrastructure

Evaluate potential risks within the security infrastructure in order to position security controls/countermeasures.

  The evaluation method being used by the testing company

Describe and assess the evaluation method being used by the testing company

  Define a two-dimensional array named temp of three rows

Define a two-dimensional array named temp of three rows and four columns of type int such that the first row is initialized to 6, 8, 12, 9; the second row is initialized to 17, 5, 10, 6; and the third row is initialized to 14, 13, 16, 20.

  What is the coefficient of correlation

E(X)=4 E(Y)=2 E(XY)=12 V(X)=6 V(Y)=25, What is the coefficient of correlation between X and Y

  Determine what SCM system

Write a 1-page summary that will help the executives determine what SCM system and strategy to use that will ensure success.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd