CSIS Discussion and Replies

profileFamilyGuy007

Instructions 


Write a thread containing a thoughtful answer to 1 question.  Answer should  contain at least 400 words.  If necessary, you may list within your  thread any concepts on which you need further clarification as well.   Also, you must reply to at least 2 threads below.  Each reply  should contain at least 200 words.  Additionally, all posts  (thread and replies) should reflect professional writing, current APA  standards, include at least 1 scholarly reference (e.g., peer-reviewed  journal articles), and integration of at least 1 biblical principle.


Thread Question:


Describe what the overall goal of protecting confidentiality is. (in 400 words at least)





Replies(Reply to each thread in at least 200 words EACH)


Thread #1


  Sloppy Coding Risks

          

When doing anything really it should always include some type of  organization and correct formats and the best practices to be as close  to perfection as possible to get the best results. Coding is no  different in this aspect than anything else. Keeping it organized and we  documented and with the standard and correct functions and scripts in  place for the application. If theses are not followed there are many  risks that can come along with it like, incorrect usability,  none-reusable or editable code, and possible malicious attacks from  sloppy code can really affect an organization.

Sloppy coding can really make the difference between an amateur  programmer and a professional in the world of IT. Most companies  probably don’t think of the risks that could come from something as  simple as sloppy coding, but a big main problem could be incorrect  coding. By just typing code and trying to get something to work a  function or certain syntax could throw off the program itself and would  thus make the end product incorrect and end up wasting time. Another  issue that I can speak about from experience is that sloppy coding makes  the code or program none-reusable or sometimes even editable for fixes  or other uses. From my experience companies end up having to just  re-create programs or scripts because the original is out-of-date or is  so poorly written in terms of syntax or documentation within the code  itself. This causes companies to waste time and money to make better  program instead of fixing their originals which is an unnecessary risk.  One last risk to note is that form sloppy coding malicious attacks can  happen for various reasons. Sloppy coding can leave open gaps for  injections of XML or SQL attacks. An article even noted about how banks  were being affected by it, “We found that overall, organizations are  taking application security quite seriously. However, there are clear  outliers to this broad finding that put companies and their customers at  significant risk” (Poor coding., 2017). This shows that even banks are  re-evaluating their codes because of sloppy coding.

Something that always comes to mind is a specific bible verse when  it comes to the work place and dealing with problems like sloppy coding  and that is this, “Whatever you do, work at it with all your heart, as  working for the Lord, not for human masters” (Colossians 3:23 NIV). This  verse always causes me to rethink my actions and helps me to try and  ensure things like sloppy coding, that could cause many problems; are  prevented and only my best work is done.



Thread #2


  Bad News for a PC 

        

A key logger is software that is installed, either intentionally  to monitor individual's computer movement or by accident when malicious  intent is involved, to track all key strokes and/or mouse movement that  is made by an individual on an infected computer. This information can  be used later to steal user-names and passwords or any other sensitive  information entered by the individual. Key loggers can be hard to  detect, and they can cause great deals of damage before individuals even  know there is a problem. An example of a key logger attack occurred in  2016 when "companies from 18 countries where key employees were targeted  with emails that contained a commercial keylogger program called  Olympic Vision." (Constantin, 2016). This allowed the attackers to  request funds to be sent to nonexistent businesses for the attackers  benefit. Although most key loggers today are software, a key logger can  also be a piece of hardware connected between the computer and the  keyboard/mouse.

A virus is "computer code fragments that attach themselves to a  legitimate program file on a computer" (Gregory, 2015), but the program  file must be run legitimately by a user to actually work. There are many  several different examples of viruses that affect many different types  of files on a computer, but I will be talking about the direct action  virus. The direct action viruses "attack certain types of files,  typically .exe and .com files. The main purpose of this virus is to  replicate and infect files in folders." (Hernandez, 2018). Although  there are many different types of viruses, many, if not most, are  detectable and curable using anti-virus software and built-in software  provided by application developers. Also, in most instances, the  information in the files can be restored after the removal of the virus  or it was not damaged by the virus.

A worm is very similar in make-up to a virus, but there is one key  difference: worms do not require a human user to activate a file. An  example of a worm is the Morris worm. The Morris worm was created by  Robert Morris to exploit "buffer overflow vulnerability in the 'finger'  program on UNIX systems." (Gregory, 2015). Worms can be far more deadly  than any virus because of the fact that they do not need to be executed.  Along with being able to self-propagate, most of the worms created were  able to cause great deals of data destruction on infected computers.  Different worms work in different ways that range from bogging down a  system substantially to deleting files that become infected with the  worm.

    • 5 years ago
    • 20
    Answer(1)

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      MainThread.docx
    • attachment
      PlagiarismReport2.pdf
    • attachment
      Replies.docx