StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Improving Web Security - Essay Example

Cite this document
Summary
Passwords are essential part of a person’s life these days. From checking e-mails to managing online bank accounts people use passwords almost all the time. The risk of password theft has grown manifold over the past few years…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Improving Web Security
Read Text Preview

Extract of sample "Improving Web Security"

Download file to see previous pages

The security of passwords was not of as much worth decades ago as it is today and this is not the sole responsibility of the institutions/bodies that offer email or banking services etc. One must consider taking multiple measures in order to increase the strength of passwords and tighten the security. It is necessary to have the understanding of how the passwords are compromised despite high security algorithms deployed by respective institutions. The easiest way of tracing the passwords of people is to introduce agent software i.e. a spyware into their computer systems to monitor, record and transmit the details of each and every activity people perform including password entries at different sites.

This happens through emails, chats and downloading form unauthentic websites like pornographic sites etc. A good internet security firewall installation can handle this situation quite effectively but the possibilities of breaches remain. One of the indications is that the computer system takes unusual time in processing usual transactions because of the added work that spywares perform. The other reasons of password compromise include the careless selection of passwords and their redundant usage at different forums to save the hassle of memorization.

Sometimes it happens that the communication between the user and the respective body like bank is intercepted by introduction of a lookalike page instead. The users most of the times remain unable to figure out the differences in haste and deliver the actual information to the false page. Redundant passwords cause more damage as the leakage of just one, opens multiple personal horizons of a person’s life before the hackers and cyber criminals. IMPROVING CONTRIBUTIONS OF PASSWORD PROTECTION FOR INFORMAITON SECURITY The baseline of information security lies in the basic structure of the information system itself.

The following steps, if taken for the better management of the system would be massive contributions to the improvement of password protection for information security. Information security is an iterative process. It is essential that this process must first be controlled; it should then be planned, implemented, evaluated and maintained. CONDUCTION OF RISK ANALYSIS The use of risk analysis identifies the security requirements of the IT Customers. IMPROVING MINIMUM SECIRUTY BASELINE The feasibility of the requirements assessed in the risk analysis should be compared with the current security assessment and implementation structure of the organization.

CONSTRUCTION OF SLA. SLA or Service level agreement between the customers dealing with an organization and the IT management of the company is required to be made. This agreement defines the measurable terms of the information security requirements. It also contains details of the specification of this achievement. OLAs Operational Level Agreements provide the detailed instructions of the implementation of the information security Requirements. These instructions are negotiated and defined. SLA AND OLA IMPLEMENTATION The successful implementation of the SLA and OLA are done.

The regular outcomes of the implementation at every transaction done are monitored. Repots about their outcomes are shared with the customer. The feedback from the customers leads to modification of the implemented information secur

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Improving Web Security Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1425429-web-security
(Improving Web Security Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1425429-web-security.
“Improving Web Security Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1425429-web-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Improving Web Security

Server Administration Policies

Issues such as security breaches, loss of network links and disk craches are prevented through measures that are taken on an emergency footing, which is meant to avoid loss of data.... The Oxford Data Center ensures safety of its data centers by physically securing its location with card-reader door locks and monitoring it on a 24-hour basis by help of recorded video surveillance and security cameras.... TSU has a policy compelling all servers in the university to register with the IT security, which facilitate risk assessment....
3 Pages (750 words) Essay

Campus Safety long proposal

Similarly, the lack of proper systems to monitor security within campus such as security cameras, alarms etc as well as the presence of antisocial elements in the proximity of the campus can also encourage crimes.... The administration and faculty in our campus are aware of the situation but, due to financial constraints they have not been able to implement adequate measures for effectively providing full security within the campus.... Thus, securing campus perimeters, installing “physical access control mechanisms” including interior locks for classrooms and controlled access locks for dormitories etc are some of the traditional means of security in the campuses (Securing Our Future 8)....
3 Pages (750 words) Research Proposal

Research Project : Information Security Management

Instructor Institution Date Information security Introduction Information systems have increasingly come under attack from various security threats.... Some of the threats gain access through systems in conventional ways that can be prevented if adequate security measures are taken while others are very hard to control due to their ability to infiltrate in to the system unnoticed (Stephen, et al, 96).... Information stored in computer systems is often under attack from different information security threats coming from different sources....
3 Pages (750 words) Research Paper

Information and Systems Security

The paper “Information and Systems security” seeks to evaluate Network security as one of the most highly debated topics in the present-day world.... Network security has many dimensions.... hellip; The author states that Network security has become a very essential part of each and every network present on this planet- be it the Internet which we use or the LANs (Local Area Networks) and MANs (Metro Area Networks)....
6 Pages (1500 words) Assignment

Web 2.0 Security

security” the author analyzes the idea of the “Web 2.... In the paper “web 2.... In this regard, this emerging idea is normally linked with web applications that are helpful to increase the capability to communicate.... hellip; The author states that additionally, the websites which encompass the features of web 2.... Moreover, the instances of web 2.... comprise a range of applications like social-networking blogs, websites, video-sharing websites, wikis, web applications, hosted services, folksonomies, and mashups....
7 Pages (1750 words) Research Paper

Database Security and Web Applications

nbsp;Database security should therefore not only concern with the protection of complex data, it should also look into tools that permit users to access information in an organized manner.... In this scenario, database security becomes necessary to defend the business against security threats.... In addition, security threats vary from state to state for instance, illegal access to the computer, storage rooms to destruction through fire, flood, earthquake and hurricane....
12 Pages (3000 words) Term Paper

Improving Security in Web Services-Based Services Oriented Architectures

This report "Improving security in Web Services-Based Services Oriented Architectures" presents an overview of the common existing internet attack methods that have been discussed.... Such a network may not be expected to respond to the normal network security methods that are applied to small private networks.... The major security parameters in any computer network are confidentiality, integrity, availability, and privacy.... These security parameters need to be satisfied in any type of internet application or service....
9 Pages (2250 words) Report

Food Safety and Security under Doha WTO Regulations Impact on Americas Southwest

The main objective of this paper is to give a broad description of "food safety and security under the Doha WTO regulations impact on America's Southwest region”.... The paper also aims at considering the relationship between food safety and the security norms of the Doha WTO regulations.... Relevant information pertaining to “The Food Safety and security under Doha WTO Regulations impact on Americas Southwest” has been developed....
20 Pages (5000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us