Preview

Nt1310 Unit 1 Research Paper

Better Essays
Open Document
Open Document
1564 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 1 Research Paper
Identify Risks, Threats, and Vulnerabilities of Social Networks and Web Applications
By
BARRY S KREMBS II
February 2013

Certification Statement
Title of Assignment: Identify Risks, Threats, and Vulnerabilities of Social Networks and Web Applications

CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper/project and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper.
I have also cited any sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper/project was prepared by me specifically for this course.
Student Signature (electronic) Barry S Krembs II

ABSTRACT While Social Media and Web Services
…show more content…
Hackers formulate different variations of Malware to take advantage of these areas before the Developers can patch and protect against these vulnerabilities (Wikipedia, 2013). Oracle’s Java is an example of an application that is vulnerable. Their latest patch JAVA 7 Update 11 is in place to prevent up to fifty of these vulnerabilities as it just recently experienced some of these exploits. Many users are disabling this application in a Browser setting, likening it to “Kissing a black rat, in London, during the plague.” As stated in the Inquirer (Neal, …show more content…
These transactions are resulting in the exploitation of resources of the Web site and of the Credit Card Providers for these users after the User’s reaches their responsible percentage quickly. The Hacker uses their methods to exploit found vulnerabilities or have a User click on an application that allows them to take control undetected while the user continues their shopping. Once the User signs off and leaves the transaction it supposedly closes its session, the Hacker suspends the transaction until the coast is clear and then continues undetected, (Imperva, 2012b).

E-Mail Takeover Emails can be hacked by various methods, and no one is immune. Recently even Presidents G.H. and G.W. Bush have had their emails hacked and information downloaded (Kim, 2013), (Rumors, 2013). By using different methods and the internet, Hackers are using Social Engineering, Google Hacking and Workplace Sabotage from a disgruntled former employee or ones who feels that they have an injustice done to them and are motivated for revenge (Link, 2013).

You May Also Find These Documents Helpful

  • Good Essays

    64. Yes p, because the elements are the same and they have the same number of…

    • 373 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Paper II - Section : II Embedded Systems INDEX No 1 2 3 4 5 6 7 8 9 10 Toggle Port LED Simulate Binary Counter at Port Generate delay using TIMER_0 Stepper Motor (clockwise/Anticlockwise) Generating square wave at port pin Generating Triangular wave at port pin Sine wave generation using look-up table Microcontrollers communicating over a serial link Read switch-status from i/p port and display at o/p port Using Input Capture Pin (ICP), measure pulse width & display at o/p port Topic Date 6-9-2010 9-9-2010 17-9-2010 24-9-2010 8-10-2010 15-10-2010 15-10-2010 29-10-2010 22-11-2010 24-11-2010 Page 02 03 04 06 07 09 10 11 13 15 Sign…

    • 742 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    graph 1.0 shows that out of ten respondent 5 are rated outstanding, 1 are rated very good and 4 are rated good with regards of the maintainability of the Point of Sale System…

    • 1214 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    (i) No, in a datagram network the routing table cannot contain two same destination addresses, since all of the destination addresses are distinct (unique) in a datagram based network i.e. it’s impossible to have duplicates in a routing table because of the distinctiveness…

    • 573 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 9 Final Paper

    • 491 Words
    • 2 Pages

    In previous post I have shown how to add a data connection in server explorer for a SQLite database file, and along the way also showed the process to create a new SQLite database file using visual studio 2010. if you haven’t read it or wish to read it please visit http://munnaondotnet.blogspot.com/2012/06/using-sqlite-in-visual-studio-2010-with.html farther more you can visit http://munnaondotnet.blogspot.com/search/label/SQLite for other SQLite post.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unix processes are instances of an executed program. UNIX, being a multi task operating system handles thousands of processes at a time. We are able to check on what processes are currently running by typing ps at the UNIX prompt. Depending on the options used with the ps command, we can see different outcomes such as $ps -ef | more. This will list all the processes in the system. Some items you might see using the ps command are PID which is the process ID number, TT or TTY shows the controlling terminal for the process. If there is no controlling terminal then a question mark is used.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Term Paper

    • 1401 Words
    • 6 Pages

    The system, because it should be usable from home, needs to be built to work over the internet.…

    • 1401 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Research Paper

    • 4285 Words
    • 18 Pages

    Each character requires one byte as it is usually stored as an ASCII character. Notice that a digit such as 8 could be held as either a character, an integer or even a real. If any calculations are going to take place on the value then it should be held as either an integer or a real. If the calculation will never result in it being extremely large or gaining decimal places then an integer should be used.…

    • 4285 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    It is an exception code which is suggestive of Windows registry corruption. 0x80070002 errors can start happening if the Windows registry has corrupted entries. Windows OS and Windows programs will fail to work unless you find a 0x80070002 fix.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cloud being single point of data access it even suffers from single point data failure /…

    • 470 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data, ideas or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course.…

    • 2790 Words
    • 12 Pages
    Better Essays
  • Better Essays

    Business Modeling

    • 2408 Words
    • 16 Pages

    CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data, ideas or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course.…

    • 2408 Words
    • 16 Pages
    Better Essays
  • Best Essays

    Certificate of Authorship: I certify that I am the author of this outline (compiled notes) and that…

    • 3800 Words
    • 16 Pages
    Best Essays