top of page
Search

Popular Myths-2

  • Writer: Abhilasha
    Abhilasha
  • Aug 12, 2021
  • 2 min read

5. Thanks to the technology, you don't need physical protection or security policy:


This is false. People deny the simple truth can the system can only protect when it's turned on. If the system is off, there is no guarantee that the data stored in it is self.

Let's take an example of firewall; even if you pay for a mid range firewall, there is no guarantee that it can save you from locally driven attacks which can be performed in a system next to yours.


Technological security measures are necessary.


6. Effective security is achieved through obscurity(not discovered):


This assumption means, the lesser you use your system, the more secure it is. Not getting connected to internet is not the solution. Any system that performs some activity will be able to disclose a lot in its configurations and people who manage that can understand.


7. Client side security successfully protects server:


As a sever administration, you have no control over client computer. The example is the client application, which does not allow user to put minus 1 as a value in the price field in online shop. But as you can't control, the client could be the administrator and use it freely.


The user could tamper with your functionality of your web page. Not knowing coding, the user may not be able to modify the code of the web page but can connect it to the page bypassing your application on a public server.


8. Cracking passwords is the biggest threat:


If an attacker can intercept the encrypted passwords, it can masquerade as the user instead of cracking the password in the authenticating system.


9. Total computer system security is a priority in all case:


Total security is not likely to happen for both computer or any device. In this case, making a system completely secure is impractical and also financially also as it is not capable of working successfully.

 
 
 

Recent Posts

See All
PE internals

Linked Libraries and Functions Imported Functions: Definition: These are functions used by a program that are actually stored in...

 
 
 
OS internals

Privilege Separation Concept: Modern operating systems separate user applications (untrusted) from critical operating system components...

 
 
 
Memory Management in short

Address Space CPU Access: To run instructions and access data in main memory, the CPU needs unique addresses for that data. Definition:...

 
 
 

Comments


Subscribe Form

Thanks for submitting!

©2021 by just dump 1. Proudly created with Wix.com

bottom of page