Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How do the threats to enterprise security differ from those posed to the individual computer user?

0
10 Posted

How do the threats to enterprise security differ from those posed to the individual computer user?

0
10

They’re actually connected. They go after individual computers. You’re familiar with the botnet piece of it, where individual computers become a network of a 100,000 or so where you have massive computing power. The botnets are used primarily for mass distribution of spam and malware, and sometimes DDOS [distributed denial-of-service] attacks. A credit card number could be picked up along the way, since the computer is captured and many of us have financial programs on our PCs. But most of the credit card and Social Security numbers come from large breaches from institutional sources. That is when bundling of card packages occurs and profiting begins. These are generally the work of organized professionals. The concern has been that security is an afterthought. How do you get IT leaders to stop tacking on security at the end of the software development life cycle and instead consider it from the start? We need to talk to developers at the very beginning of the conception stage. Right n

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.