Explore BrainMass
Share

Explore BrainMass

    Security and Network

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    Please help answer this two questions
    1. describe a recent high-profile computer security issue that you have heard of or read about. According to basic network security principles, how might the issue have been avoided? Provide at least one resource.

    2. consider a natural or man-made disaster, and discuss how a communications network could be recovered from such a disaster. Refer to communication issues experienced during and after the tsunami in December of 2004 or similar issues experienced in the aftermath of Hurricane Katrina in August of 2005. Provide at least one resource.

    © BrainMass Inc. brainmass.com October 9, 2019, 8:54 pm ad1c9bdddf
    https://brainmass.com/computer-science/java/security-and-network-166485

    Solution Preview

    1. Describe a recent high-profile computer security issue that you have heard of orread about. According to basic network security principles, how might the issue have been avoided? Provide at least one resource.

    A recent high-profile issue was with, "LiveJournal, an online community that boasts nearly 2 million active members, on Thursday announced sitewide changes for users logging into their accounts -- changes prompted by a hacker group's successful hijacking of potentially hundreds of thousands of user accounts.

    An established hacker group known as "Bantown" (I would not recommend visiting their site at work) claimed responsibility for the break-in, which it said was made possible due to a series of Javascript security flaws in the LiveJournal site...members of the group claimed to have used the Javascript holes to hijack more than 900,000 LiveJournal accounts."

    Link: http://blog.washingtonpost.com/securityfix/2006/01/account_hijackings_force_livej.html

    This issue might have been avoided because, "an attack applet launches network security attacks on other machines. This is something that an attacker could already do before Java came along. The twist is that by embedding the attack into an applet, the bad guy makes the attack come ...

    Solution Summary

    Security and network in a natural or man-made disaster is discussed. How to avoid high-profile computer security issues is determined.

    $2.19