Immigration Financial Information Bangladesh Gateway General World Cup Entertainment Programing University and College Scholarship Job Interview Health Job

Sunday, March 15, 2009

Web Threats and Solution (2009)

Web Based Malware
blogging tools and client side browser plug-ins including Flash have caused
malware to be installed when users simply visit a web page.
Social Networking Malware
create a fake profile on a social networking website and use it to post malicious links
and “phish” other users.
Web 2.0 - a double edged sword
Web 2.0 allows an open forum for customers and partners
to share ideas in a real-time setting.several well known social networking sites offer users attractive applications to enhance their profile pages. Often times these applications
are built by third parties where the security of the code is not monitored. Upon
downloading the application an unsuspecting user can inadvertently insert
malicious code onto their profile page, and therefore their computer and
potentially their network.
Social Networking Spam
Threats from spammers and cyber criminals which target the social networking
environment are very real. They use this new media to insert deception into
fully scalable business models.
Phishing – Taking Control of Domain Name Service
By taking control of companies’ Domain Name Service
(DNS) database records, phishers take advantage of the good reputation of
these domains since they weren’t blocked by filtering solutions.

The Risks
Security problems
Reduced productivity
Legal risks
Wasted bandwidth
Unlicensed software
Reputation risk

Hosted Services Advantages

Implementing a hosted service solution allows you to shift your resources away
from operational risk management tasks toward strategic business objectives
at a predictable cost. Many of the benefits associated with hosted services are
profiled below.

Lower IT Costs
Economies of Scale
Pay As You Go
Save Time


No comments :

Post a Comment