Monday, February 24, 2020
Computer security Essay Example | Topics and Well Written Essays - 250 words - 1
Computer security - Essay Example Every organization should be cautions to information or sites concerning their web services. Most hackers would normally exercise the illegal practice to either search for credit or endorse a basis when vandalizing a high profile site (Lennon, 2012). Oracle Corporationââ¬â¢s website was hacked, and words displayed to cause confusion and outcry from the users on the homepage (Lennon, 2012). The practice of hacking led to prosecution and fine of Razvan in the court of laws. Security countermeasures that might be used to avoid hacking include frequent change of passwords and use of latest data protection versions of software. Additionally, hacking can be avoided in the future by educating users about prior changes in the user interface details that might confuse them. Users should only trust official information from Companies websites and not messages that are displayed at the homepages. Hacking is a process that disables normal operation of a website or a webpage. It is an illegal activity performed by individuals who gain access to an individual or organizationââ¬â¢s website, then deface the crucial features in the webpage. The hacking process leads to users being unable to enjoy the services from the website. The implications of this practice are that other users were able to access the webpage using their mobile phones, but others could not do so using desktop computers. This caused confusing among the users since no prior information or the companyââ¬â¢s press had offered disclaimer. Similarly, other services were functioning as usual without any reported cases of vandalism. It appeared that there was also a chance that Oracleââ¬â¢s web group made an error during update development or site protection (Lennon, 2012). Hacking is not a regular maintenance practice by organizations but a means aimed towards affecting the operations of commonly visited
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.