Page 148 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 148

Information  Security and Privacy




                    Notes          Compliance with Regulation

                                   In the United States, the Gramm-Leach-Bliley Act needs companies to inform consumers of their
                                   privacy policies and to offer opt-out provisions for customers who do not want their personal
                                   information distributed away from the  company. Additionally, the Gramm-Leach-Bliley Act
                                   protects non-public financial data. Data amassed on a computer that has even a remote possibility
                                   of enclosing information like social security numbers, credit card and financial account numbers,
                                   account balances, and investment portfolio information must be confined. The use and revelation
                                   of patient medical information initially was confined by a patchwork of U.S. state laws, leaving
                                   gaps in the security of patients’ privacy and confidentiality. The United States Congress also
                                   documented the requirement for  national patient record privacy standards in  1996 when it
                                   endorsed the Health Insurance Portability and Accountability Act of 1996 (HIPAA), caring all
                                   medical records and other independently identifiable health information used or disclosed by
                                   an enclosed entity in any form, whether electronically, on paper, or orally. In addition to the
                                   legal consequences of a security breach, independent research firm, Computer Economics has
                                   validated that malicious attacks effect in actual  financial costs, decreases in  revenue, and an
                                   unbelievable force on  productivity.
                                   In  the  last numerous years,  there  has been  a considerable  growth  in  cyber  crimes.  These
                                   days more and more hacker are objecting enterprise applications and database servers. Most
                                   large organizations have already installed antivirus software, firewalls and even Intrusion
                                   Detection Systems (IDSs) to protect their networks and host operating systems, but fail to
                                   provide proper concentration to enterprise database servers, on the supposition that they
                                   are secluded by firewalls and other defenses at the network perimeter. Yet these databases
                                   are the main reason enterprises invest in IT in the first place, and the data they enclose are
                                   frequently the enterprise’s most valuable assets. Certainly, an enterprise without database
                                   security is like a bank with locks on the doors and armed protectors by every entrance, but
                                   no vault.

                                   Database servers are attacked by hackers because:
                                   1.  If we gaze closely we will see why the hackers adore hacking the database server.
                                   2.  Most of the database servers are configures with default usernames and passwords, etc.
                                       user Scott password Tiger or user system password manager.
                                   3.  Most of the database servers are using default setting which was set by manufacturers, etc.,
                                       by default public have opportunity to implement.

                                   4.  Database servers are not patched correctly.




                                      Task  Describe Why hackers attack database servers.

                                   Self Assessment

                                   Fill in the blanks:

                                   5.  The general factor in today’s ........................ economy where most of the business is prepared
                                       electronically by means of B2B [Business to Business] or by means of B2C [business to
                                       consumer]
                                   6.  An ........................ without database security is like a bank with locks on the doors and
                                       armed protectors by every entrance, but no vault.





          142                               LOVELY PROFESSIONAL UNIVERSITY
   143   144   145   146   147   148   149   150   151   152   153