***Welcome to ashrafedu.blogspot.com * * * This website is maintained by ASHRAF***

Posts

    Latest Updates

    Monday, May 23, 2022

    Unauthorized access by outsider

    Unauthorized access is when someone gains access to a website, program, server, service, or other system using someone else's account or other methods.

    Any access to an information system or network that violates the owner or operator’s stated security policy is considered unauthorized access. Unauthorized access is also when legitimate users access a resource that they do not have permission to use.

    The most common reasons for unauthorized entry are to:

    • Steal sensitive data
    • Cause damage
    • Hold data hostage as part of a ransomware attack
    • Play a prank

    The three primary objectives of preventing unauthorized access are:

    • Confidentiality—the protection of sensitive information from unauthorized access
    • Integrity—the protection of sensitive information from unauthorized modification or destruction
    • Availability—the protection of sensitive information and information systems from unauthorized disruption

    The damage from unauthorized access goes beyond time and money; trust and reputation are also casualties.

    Protection of sensitive data should be top of mind and a high priority in all organizations. A defensive, proactive approach to preventing unauthorized access can protect information and systems from disclosure, modification, destruction, and disruption.

    No comments:

    Post a Comment

    Network session analysis

    Network session analysis Network session analysis is a method of monitoring network activity and availability to identify issues, such as ...