Reference
O'Brien, D. (2011, Mar 25). Web security breaches show better solutions are necessary. Irishtimes. Retrieved on Mar 30, 2011. From : http://www.irishtimes.com/newspaper/finance/2011/0325/1224293036719.html
Summary
This article discusses the recent attacks that have happened on the Internet for a number of companies and individuals. The author pointed that there are certain parties that try to do this kind of attack on special computers to obtain information and documents. The author expects that some of the attackers have great power and some of them are ordinary people who sell this information and documents in the black market. Also he expects that the attacker is someone from the company who steals the information and sells it to a third party. The author talks about the ways and solutions that are necessary to protect the information. Also he tells us about the safety of these solutions and they will prevent the attacker from entering personal pages.
Reaction
My major is Computer Science, so I’m very interested in reading about what happens in the computer world, what are the most important developments, what are the problems and what are the ways to solve these problems. In this article, I read about attacks, the largest and the most important problems in the internet and computer. People have been suffering from these attacks for a long time, but in fewer cases in smaller amounts. Because of the damage caused by these attacks, people start to find ways and solutions to stop these attacks. Some of these are not working and some are working like the solution that the author talks about in this article. This solution is using SecurID technique from RSA. My opinion as a Computer student is that it is a wonderful protection system because it is difficult for attackers to enter to the personal pages and steal information. I like this technique because it has a high level of protection which is to give a password using a one-time and change it every 60 seconds, which provides secure access to the resources. Through my study I noticed that as long as there are protection programs there are people who are able to break this protection. Therefore, there must be continuously updating of these protection programs. I see all companies must use technique like this to have Protection against unauthorized access.
No comments:
Post a Comment