The company CTO sighed after looking over his logs. Clearly, his company's Web servers had been the victim of a DDoS (distributed denial of service) attack, and his servers had been able to handle the extra load, but the router that gave him Internet access had not. For six minutes of the 15-minute attack, his Web servers were inaccessible.
If ever there were an application where open-source software should be mandated by law, electronic voting has got to be it. The benefits of a simple user interface for a populace confounded by the intellectual demands of punch cards are obvious. A well-designed and transparent touch-screen ballot system with proper cryptographic protections and a robust auditing mechanism would go a long way to avoiding recount debacles like the one in Florida that made the 2000 elections so intriguing.
Computer-science researchers from Johns Hopkins University and Rice University are heaping criticism on electronic voting machines built by Diebold Election Systems, based on software code for the machine said to have been posted publicly to the Internet by an activist.
Thieves are using chat rooms to sell stolen credit card details and advise others how to hack websites containing credit information, security experts have warned.
Groups using internet relay chat (IRC) are playing a growing role in online credit card fraud.
A report by the Honeynet Project, which monitors criminal activity on the internet, shows that online thieves are becoming increasingly sophisticated.
The credit card details are not only used to purchase products but to clone the card owner's identity.
Nowadays companies and organizations face the problem where massive attempts at illegal intrusions hit their network on a daily basis. In spite of the latest technological improvements in security, it's still the network users who are often unknowingly inviting security breaches through carelesnes and a lack of awareness. This paper will try to summarize various mistakes done by system administrators, company executives and of course the end users, and will also provide you with useful strategies that will definitely help you reduce or completely eliminate the mistakes.