16 Jul Security Threats A Facebook data breach revealed more than 530 million individuals ?personal information to hackers. This included the date of birth, users ?name, current city,
Part 1: Security Threats
A Facebook data breach revealed more than 530 million individuals’ personal information to hackers. This included the date of birth, user’s name, current city, and posts made on their wall. The exposure was discovered in 2021 even though it existed since 2019.
This breach happened when cybercriminals scraped data from Facebook’s servers using a misconfiguration in their contact importer. As a result, they could gain access to the personal information of millions of people.
According to (Vojtko How to prevent security misconfiguration) “The most common mistakes that lead to security misconfiguration are: Unnecessary ports being left open, Unneeded services permitted to run, Leftover pages still available to access, and Unused accounts with certain privileges not being deleted.”
By not removing these things you are leaving the application open to attacks. A couple of things we can do to prevent Security Misconfiguration are: Remove unused features, Disable the use of default accounts and passwords, and Limit access to administrator interfaces.
Part 2: Mobile devices
A desktop computer is more physically secure than laptops, smartphones, and tablets because it is often kept in one location, making it easier to protect. Desktop’s access to internet usually comes from a single source, which help to fight malware easier.
Each one of these items have different practices when it comes to secure your device, these are a few ones that they have in common:
Always run updates, avoid public or suspicious Wi-Fi, enable remote lock, enable user authentication, turn off device when not in use, and restrict physical access to device.
I'm already implementing a few security practices on my mobile device to protect it from being hacked. For example, I try to avoid social media apps as much as possible ( I do not have Facebook, Twitter, Tik Tok). Instagram is the only social media platform I have, and I always try to share as less information about myself as possible.
Another practice I use is to always download files from a trustworthy source or page.
References:
Vojtko, Mark. “How to Prevent Security Misconfiguration.” Hashed Out by The SSL Store™, 28 Dec. 2020, https://www.thesslstore.com/blog/how-to-prevent-security-misconfiguration/.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
Do you need help with this question?
Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.
WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.
With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Chat with us today! We are always waiting to answer all your questions.