Wednesday, June 12, 2019

Attacks in Computer Systems versus Web-based Systems Case Study

Attacks in Computer Systems versus Web-based Systems - Case Study ExampleThe similarities are in like manner influenced by the homogenous nature of the technologies used in both types of systems. A web-based system is, essentially, a computer system that supports activities on the internet. This makes web presence the only contrast between the two systems and creates the uniformity in the types of attacks employed.The growth in web-based cybercrime has been enabled by various factors, which have had different magnifying effects on the observed append in this type of woeful activity. The prototypical factor is the increasing availability of internet connectivity in many areas of the world. Although it may appear trivial at first glance, greater access to the internet has inspired many hackers to engage in cybercrime to the extent that they can find whichever resources they want (Provos, Rajab, & Mavrommatis, 200942). Using the internet, potential hackers can well access discipl ine that instructs them on how to commit cybercrime. For example, currently, anybody with an internet connection can view links containing tutorials on how to engage in cybercrime. It is safe to say that this information is more easily accessible to people with internet connections than those without.The second factor is an increase in online transactions that have created opportunities for people to engage in criminal activities like stealing of online financial information. The internet has brought with it an explosion in e-commerce, and since e-commerce relies on web presence, cybercrime has grown alongside it. It is a case of people taking reward of the weaknesses involved in online transactions like the provision of credit card information and identification data (Provos, Rajab, & Mavrommatis, 200944). However, this could also be said to be a direct result of technological development. As technology becomes more advanced, its flaws become more pronounced.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.