Wednesday, July 24, 2019
Software Security and its Role on Cyber Security Research Paper
Software Security and its Role on Cyber Security - Research Paper Example The number of cyber crimes is growing exceptionally on an annual basis and because of this reason; the internet is becoming more and more unsafe. The level of hackerââ¬â¢s intellect is growing as he or she is gathering more knowledge and information about the art and science of hacking (Xu, Hu, & Zhang, 2013). The companies on the other hand, restricted their exposure to the vast universe of internet by inventing intranet. The intranet is an infrastructure that helps an organization in creating a network within the network of networks. The private networkââ¬â¢s identity and access is restricted to employees only. The employees have to login with a specific and unique username and their activities are strictly monitored as well. The modern technique of intranet is also not working because the hackers have devised methods that can locate and identify the networks. Once the network is located then the hackers use the information to hack the central computer and therefore, the enti re network starts to play in the hands of evil geniuses. The era of antivirus is also coming to an end. The antivirus programs are famous for providing the hackers a plain ground. The viruses are nowadays programmed to alter the binary coding of the antivirus and in this way; the protector of the system becomes its worst enemy. The hackers managed to follow the technique of Aids virus. The virus does not cause any type of illness but kill the immune system of the human body. Consequently, the viruses of other diseases move in and finish the job. The intelligent hackers eliminate the defense system of the network and then, other harmful programs move in and render the entire network inoperable. The technical staff becomes helpless in front of the multiple attacks and therefore, has to purge all data in the network (Sukwong & Kim, 2011). The modern hackers and technical teams at various data centers of the world are suspected to be engaged in a never ending battle. The war is fought l ike a game of chess and whole game-plan is based on striking and counterstriking. In most number of cases, the objective of hackers is fulfilled. The hackers always like to cause hindrance in the operationality of the network and it is fulfilled with the help of causing sufficient doubt in the minds of technical teams. The technical teams cannot afford to take any threat lightly and therefore, if they believe that the game is getting out their hands then they have to shunt the network before finding a bug. The networks are insecure and this is a common belief. The sales of antivirus programs are declining and this is the depiction of decreasing public trust on leading names in the industry of internet security. Additionally, the latest internet browsers are programmed to detect any suspicious product or webpage. All of the viruses and other harmful programs are known to come from the internet in the global village of the 21st century. The best defense is prevention and therefore, th e modern programmers have decided to put a blockade in the way of viruses by planting a smaller and efficient antivirus program within the fabric of browsers (Singh, Moshchuk, Wang, & Lee, 2010). The users are notified as soon as the suspicious activity has been detected. The browsers are designed to block the potentially harmful events from happening until and unless the user allows them to take place. In this manner, the virtually nothing can go on without the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.