article06 - Jean Maurice Rakotoarimanana Article 06...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Jean Maurice Rakotoarimanana Article 06 According to Roger Kay, of analysis Endpoint technologies Associate, hackers depend on simple social engineering attacks to gain footholds. A laptop was infected with a malware and permitted unauthorized access to a database which contain names, addresses, Social Security numbers, PenFed account numbers, credit card numbers and/or debit card numbers. According to New Hampshire resident, approximately ten thousands of current and former Pentagon workers will be affected. Sometimes users unknowingly gave access to the malicious program, by clicking a link which contain malware program. And from there the link lead the user to a download they didnt want. Savvy hackers have their way to make their program looks like a normal program to deceive users. It is important to have a good authentication and verification of Endpoint protection prior to connection with important assets. It is also a good practice for companies who handle credit card data and PII to limit the numbers of servers and employees who can touch the data. By storing key information on its own servers, rather than giving it to a third part, a company can retain control of that datas protection. Company holding customer data should use a Web application firewall, develop software using secure practices and focus on whitelisting technologies for key servers....
View Full Document

Page1 / 2

article06 - Jean Maurice Rakotoarimanana Article 06...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online