It is at this point that hackers can be able to penetrate these vulnerabilities to use them as a backdoor inside a company's database. Once this occurs, is when there is the possibility that the situation will become worse as more criminals will utilize this as an easy way to overcome the challenges of going directly after a firm's initial blocks. This is important, because it is showing how there are increased vulnerabilities that these phones have due to the lack of effective security. (Coleman, 2011)
To make matters worse, many firms have begun using cloud computing as way to store large amounts of information. This is when they have significant pieces data on an organization's mainframe. The reason why, is because these kinds of computers have become more powerful and cheaper. This is allowing a variety of firms to be able to reduce costs and increase the total amounts of storage that they have available. The problem is that this kind of security procedure is giving hackers the ability to overcome traditional defenses. Part of the reason for this, is because a number of security experts have been advising their clients about how their current strategy can deal with any kind of threats they are facing. Once this occurs, is when it can lull most IT personnel into a sense of complacency about the overall nature of the threats. This is the point that odds increase that hackers will be able to break into mainframe computers that are storing large amounts of information. (Kark, 2011) (Tanzy, 2011)
A good example of this can be seen with the recent announcement that the security firm Stratfor (as they were the victim of this kind of attack.) What happened was a group of hackers identifying themselves as Anonymous had broken into the firm's mainframe and they were able to gain access to thousands of credit cards along with other pieces of personal information. Some of Stratfor largest clients include: the U.S. Air Force, Apple, and the Miami Police Department just to name few. Instead of using this information for illicit purposes, the hackers were politically motivated by calling for the release of Specialist Bradley Manning. He is accused of giving the web site Wiki Leaks tens of thousands of classified U.S. government cables. What the group has been doing is making donations to charity with the stolen information that was obtained. This is problematic, because it is showing the increasing vulnerability that a number of organizations are facing. The reason why, is because most firms are relying on IT security experts and consultants to reduce their risks. During this process is when they will have them store large amounts of data on their mainframe through cloud computing. However, the fact hackers are able to gain access by directly going after portable mobile devices is an indication that they can use this as a way to circumvent various security procedures. Once this takes place, is when they can be able to gain access to large amounts of information undetected. This is significant, because it is showing how there are increasing vulnerabilities that most firms are facing. ("Anonymous Hackers Target U.S. Security Think Tank," 2011)
As a result, IT security personnel must be able to understand the overall nature of the threat and how to effectively counteract what is happening. Otherwise the odds increase that there will be more of these kinds of incidents taking place. This is when there is the possibility that large amounts of information stored on various databases could increase the overall vulnerabilities of an organization to hackers. Once this takes place is when the odds improve, that there will be larger amounts of security breaches that are being reported. This is the point that it will be difficult to protect and store sensitive information that are vital to the success of an organization in achieving its objectives. Therefore, it is essential for IT personnel to create a strategy that will take the changing nature of the threat into account and how it should be effectively counterbalanced.
Specific Tools that can be used to enhance a Firm's ability to protect themselves
To deal with any kind of possible threats to the database in the future all organizations must be able to use a number of different tools in achieving these objectives. The best way that this can be accomplished is through having an approach that will specifically address the overall nature of the threat. This means that all organizations must implement an approach that is based upon flexibility and utilizing techniques that will deal with these...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now