Friday, February 20, 2009

Attacks - Weaknesses of security commonly exploited

Abstract: Throughout time, the advancement of technology and communication has led to the emergence of new attack vectors and new forms of crime that have turned to the Internet and computer technologies in areas most hostile to any kind of organization, and person that has equipment connected to the World Wide Web.

Unlike what happened years ago, where people with extensive skills in the computer world enjoyed researching these issues with the aim of incorporating more knowledge, at present has been completely distorted giving rise to new characters who use computer resources and knowledge on its operations as tools to commit crime and get some economic benefit.

Every day new vulnerabilities are discovered and, usually, only those responsible for IT including in its just measure the importance of safety and how they can address the serious problem that exists behind vulnerabilities that allow an attacker to violate security environment and commit crimes using the data stolen.

Click here to read more...

- EF

No comments: