{"title":"组织中的安全漏洞及其对策","authors":"Pavitra Chauhan, Nikita Singh, N. Chandra","doi":"10.1109/CICN.2013.79","DOIUrl":null,"url":null,"abstract":"Today's business rely completely on IT network and their connections with the global Internet as the backbone of their sales, sourcing, operating and financial systems. In a similar way many aspects of our lives rely on internet and computers including communications (email, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth/death records, Social Security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine (equipment, medical records), and education (virtual classrooms, online report cards, research). In this 21st century no government, business, nongovernmental organizations are purely invulnerable to the cyber attacks. Password based attacks are more popular kinds of attacks that can harm the firm/organization. So, here we present the prevention of a password based attacks. Our main focus was to know about the security breaches in an organization and how are they handled by them. Inspired by such facts, the project revolves around security breaches in the organization and their respective counter measures.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security Breaches in an Organization and Their Countermeasures\",\"authors\":\"Pavitra Chauhan, Nikita Singh, N. Chandra\",\"doi\":\"10.1109/CICN.2013.79\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today's business rely completely on IT network and their connections with the global Internet as the backbone of their sales, sourcing, operating and financial systems. In a similar way many aspects of our lives rely on internet and computers including communications (email, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth/death records, Social Security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine (equipment, medical records), and education (virtual classrooms, online report cards, research). In this 21st century no government, business, nongovernmental organizations are purely invulnerable to the cyber attacks. Password based attacks are more popular kinds of attacks that can harm the firm/organization. So, here we present the prevention of a password based attacks. Our main focus was to know about the security breaches in an organization and how are they handled by them. Inspired by such facts, the project revolves around security breaches in the organization and their respective counter measures.\",\"PeriodicalId\":415274,\"journal\":{\"name\":\"2013 5th International Conference on Computational Intelligence and Communication Networks\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 5th International Conference on Computational Intelligence and Communication Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CICN.2013.79\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Computational Intelligence and Communication Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN.2013.79","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Breaches in an Organization and Their Countermeasures
Today's business rely completely on IT network and their connections with the global Internet as the backbone of their sales, sourcing, operating and financial systems. In a similar way many aspects of our lives rely on internet and computers including communications (email, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth/death records, Social Security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine (equipment, medical records), and education (virtual classrooms, online report cards, research). In this 21st century no government, business, nongovernmental organizations are purely invulnerable to the cyber attacks. Password based attacks are more popular kinds of attacks that can harm the firm/organization. So, here we present the prevention of a password based attacks. Our main focus was to know about the security breaches in an organization and how are they handled by them. Inspired by such facts, the project revolves around security breaches in the organization and their respective counter measures.