This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Access Control Attacks

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Access Control Attacks

With the current world of cyber-attacks, preventing access to information and data is very important. Cybercriminals can access systems, data and information through dictionary attacks where they find keywords used in an order. They can also access the system through brute force where they crack the passwords and username of users. Also, through spoofed login screens where the hackers block users from accessing their accounts and send them new passwords which assist the hackers in gaining access. Regardless of the type of access, when hackers gain access to systems, the effect can be dire (Wang, Liu, Yang, Zhou, Li, & Xu, 2018). The purpose of this paper is to discuss three methods to prevent access control attacks.

Creating strong passwords

This is one of the methods of circumventing access attacks. Strong passwords are hard to crack. The password should have more than eight characters; it should contain a mix of letters, words and symbols and should include both the upper and the lower case. At the same time, users should avoid using the same password in different accounts. Lastly, the password should be changed from time to time (Wang, Liu, Yang, Zhou, Li, & Xu, 2018).

Control of physical access

Threats to attack can happen at any place, including the place of work. When criminals gain access to physical systems, it6 becomes easy for them to figure out how they can intrude the system (Wang, Liu, Yang, Zhou, Li, & Xu, 2018). Therefore, one should safeguard laptops, tablets and phones that have critical information.

Using multi-factor authentication

Users should deploy multi-factor authentication, which combines passwords and biometric controls. When hackers crack passwords, the biometric or token devices will block him/her from accessing the system. Additionally, the password should have a two-step verification which will notify users either on their phones or email when the account is being accessed (Wang, Liu, Yang, Zhou, Li, & Xu, 2018).

In conclusion, system access is one of the most method used by hackers to steal sensitive information. Access can be conducted through spoofing, dictionary attacks or brute force. Control of access can be done through creating a secure password, preventing access to the physical system and using multi-factor authentication.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask