Sunday, September 8, 2019

Cybersecurity Coursework Example | Topics and Well Written Essays - 250 words - 8

Cybersecurity - Coursework Example Having maliciously developed functional Private keys from one Secure Socket Layer certificate, attackers can use these keys to sign other certificates. This weakness in MD5 hashing exposes risk to information in systems because attackers can easily pass off fake Certificates of authority. In some cases, this algorithm has been subjected to reversing which allows attackers to crack passwords. It is therefore safer for CAs to opt for safer algorithms like SHA-1 and SHA-2. The suggestion that a system of ‘least privilege’ is the best way of restricting information damage is viable. Putting in place at least privilege policy in an organization would be the most appropriate way to manage information damage and misuse. This policy guarantees that not a single person is granted an indiscriminate clearance level of data therefore; the risk of exposure to malicious damage is reduced. Division of duty also works well especially in the IT department in cases where accidental erasure of data is experienced. The loss is then only limited to the level of access that particular staff has. It is therefore appropriate to grant staff in the organization access to information only on a need

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.