Monday, August 12, 2019
What will replace passwords Research Paper Example | Topics and Well Written Essays - 2750 words
What will replace passwords - Research Paper Example At the same time, social media has created a medium for people to interact and share their personal information with other people located in different parts of the world. Countries have democratized the use of technology in order in order to sustain the stream of development that can be accrued from the use of the internet. It is now evident that the expanding of cyberspace is bringing new opportunities and at the same time; new threats. While the cyberspace is encouraging open markets and open social orders, the openness of this space has exposed the people towards cyber attacks. Many of the countries have tried to protect their people against the attacks. However, the technological sector is evolving very fast, an aspect that is making it very hard for the institutions that have been put up to deter the attacks to keep up with the changes. The internet providers and social media companies have not been able to put up stern measures to avoid the attacks. A cyber-attack is the conscious misuse of computer frameworks, technology-ward endeavours, and systems. Cyber-attacks use pernicious code to modify computer system, rationale, or information, bringing about troublesome results that can trade off information and lead to cyber crimes, for example, data and wholesale fraud (Wilson, 2014). Cyber-attacks were originating from various distinctive sources and varieties. There are different procedures to use in cyber-attacks and an assortment of approaches to control them to people or foundations on a more extensive scale. Attacks are broken down into two classes, Syntactic attacks, and Semantic attacks. Syntactic attacks are direct; it is viewed as vindictive software which incorporates viruses, worms, and Trojan stallions. A standard computer virus, presumably the most widely recognized type of a cyber-attack, may addition beginning to access to a computer or framework in two ways: remotely or proximately. A few viruses, for example, Conficker, spread through a
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.