Even just talking on the phone can be a security risk


One aspect of the physical web infrastructure is storage. A number of companies will store your personal information for such reasons as returns, ease of access on future purchases, etc. So the need to keep this information secure is paramount. As a business's revenue comes from customers, so retention is key.

According to Harwood, "The e-business.needs storage methods that keep customer data secure, including personal and credit card information. A hole in any security point can and will likely lead to a security breach," (Harwood, 2016).

Another aspect is web servers which, according to Stuttard, can be severely under secure several. "Historically, many servers have shipped with insecure default options, which present opportunities for attack unless they are explicitly hardened," (Stuttard, 2011).

This causes a real issue especially with administrative privileges as, "Many web servers contain administrative interfaces that may be publicly accessible. Frequently administrative interfaces have default credentials that are well known and are not required to be changed on installation," (Stuttard, 2011). Another aspect of the physical web infrastructure is end user devices. End user devices are an important aspect of the physical web infrastructure and need to be secure.

The reason being is that they are easily attackable, according to Harwood, "MMS messages can successfully carry remote code to be run at the end user's device. End-user devices will receive unsolicited MMS messages, by design, and properly execute injected code within the MMS multimedia," (Harwood, 2016).

This is just one type of end user device, others end user devises include VoIP phones, desktops, laptops, smart phones, tablets, and other gadgets such as smart watches. If the end user devices were issued from the company itself, then the cyber security personnel should have no moral dilemma in monitoring these devices.

Even just talking on the phone can be a security risk, according to Harwood, "there will be a slight increase in risk due to all the vulnerabilities, malware, and hacks that exist for PC-based systems and applications," (Harwood, 2016).

So the need to secure these devices is paramount, if it is within the company's domain to protect. The Bible says, "Then God said, "Let us make man in our image, after our likeness.

And let them have dominion over the fish of the sea and over the birds of the heavens and over the livestock and over all the earth and over every creeping thing that creeps on the earth." (Genesis, 1:26). Bibliography Harwood, M. (2016). Internet Security:

How to Defend Against Attacker on the Web. Jones & Bartlett Publishers. Stuttard, D., & Pinto, M. (2011). The web application hacker's handbook: finding and exploiting security flaws. John Wiley & Sons.

Article with references in APA format.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Even just talking on the phone can be a security risk
Reference No:- TGS02456565

Now Priced at $10 (50% Discount)

Recommended (93%)

Rated (4.5/5)