Sample by My Essay Writer
The Sony Playstation Network Hack of 2011 that affected 77 million people, the December 2015 hack of Valve’s Steam platform that impacted 34,000 subscribers and the September 2016 Yahoo hack that compromised the personal information of 500 million users show that major corporations, even those with supposedly “impenetrable systems” are not immune to being penetrated by a determined hacker or hacking group. The problem stems from the programming arms race between corporations and hackers with one group constantly looking for flaws in program architecture and the other patching the identified flaws in the system (Ferdinand, 2015). [Click Essay Writer to order your essay]
Company databases are valuable since they can contain personal information and credit card numbers which would enable whoever obtains them to accomplish identity theft (Jenab & Moslehpour, 2016). In fact, there is an underground market on the dark web (sites that can only be accessed via TOR browsers) that enable people to buy and sell information that has been obtained by hackers. Companies attempt to safeguard their databases through continuous investment into better systems, more robust programming architectures, elaborate anti-virus programs and other methods of preventing their accumulated data from being stolen by unscrupulous individuals. [“Write my essay for me?” Get help here.]
Unfortunately, there is no such thing as a truly secure system when it is connected to the internet. Programs follow, by their very design, a set of rules when it comes to their implementation within a system. Understanding these rules and knowing their different vulnerabilities based on research and experimentation is the very essence of what hackers do. Through this paper, the concepts of security by design, present day security measures and the process of vulnerability management will be examined to showcases how each method contributes towards present day methods of safeguarding data. It is anticipated that this process will reveal that no matter how advanced the method of database protection, there is always a means of circumventing it. [Need an essay writing service? Find help here.]
Ferdinand, J. (2015). Building organisational cyber resilience: A strategic knowledge-based view of cyber security management. Journal Of Business Continuity & Emergency Planning,9(2), 185.
Jenab, K., & Moslehpour, S. (2016). Cyber Security Management: A Review. Business Management Dynamics, 5(11), 16-39.