Question and answer
explain how encryption might have helped prevent or lessen the effects of Bibliofind's security breach.
If Bibliofind used secure sockets layer (SSL) encryption to transmit data over secure sockets, the security breach would have failed, or at least would have been less severe. [ Had the data been encrypted, the hackers would have ended up with MD5 hash, or some other form of encrypted values that they could not decrypt without the server-side keys. The architecture of the Bibliofind database should have had encrypted fields that could only be decrypted with the server-side encryption keys. The cost of this would have been very minimal as we can get SSL keys from various providers (ie –
Verisign) for very cheap. Data encryption does not stop intruders from opening or exposing security holes on a server, however encryption makes it very difficult to render stolen data in to any kind of usable format. If Bibliofind did utilize data encryption, the intruders would have either spent a lot of time trying to break the encryption keys, but more than likely moved on to another site that did not have any encryption. From this we learn how important data encryption is any time we conduct e-business. Unfortunately it sometimes takes these breaches in order make our technologies stronger, but we learn lessons and learn to become more effective in future projects. ]
g
Expert answered|jeifunk|Points 6625|
Question
Asked 9/18/2012 8:42:02 AM
0 Answers/Comments
This answer has been confirmed as correct and helpful.
Get an answer
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
Where should Biliofind have placed firewall in its network and what kind of rules they should have used tofilter network traffic?
Weegy: The computers we use in today’s society are advancing every day. Every child and adult can operate or manipulate most home computers. [ We are being taught that to succeed in today’s electronic world, the computer will help in providing all the answers. One of the problems we face with the computer is that there are so many rights versus wrong, or good versus bad things that can be done using a computer. In this report we will discuss how Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers, how encryption might have helped prevent or lessen the effects of Bibliofind’s security breach, and the California law requiring companies to inform customers when private information might have been exposed during a security breach. How Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers, where the firewalls should have been placed in the network, and what kinds of rules they should have used to filter network traffic at each point. For people who are not familiar with a lot of computer terms, “a firewall is software or a hardware-software combination that is installed in a network to control the packet traffic moving through it. The firewall provides a defense between a network and the Internet or between a network and any other network that could pose a problem (Schneider, 2011, p.479)”. If Bibliofind had wanted to prevent intruders from gaining access to its transaction servers they should have used “trusted” networks where they had the client information. It is known that networks outside the firewall are unreliable (untrusted) and could cause a problem. The firewall acts as a filter to allow selected messages to flow in and out of the network. The firewall should not stop people who want to do business with Bibliofind, but restrict any and all (employees included) ] (More)
Question
Expert Answered
Asked 9/16/2012 7:47:23 AM
0 Answers/Comments
Define Emotion
Weegy: Emotion is a strong feeling (such as love, anger, joy, hate, or fear). (More)
Question
Expert Answered
Updated 3/31/2015 11:15:54 PM
0 Answers/Comments
32,012,259
questions answered
Popular Conversations
Charts can either be embedded in a worksheet or placed in a separate ...
Weegy: Charts can either be embedded in a worksheet or placed in a separate chart sheet. User: A relative cell ...
8/11/2020 12:58:54 PM| 4 Answers
Which NIMS Management Characteristic helps to eliminate confusion ...
Weegy: The National Incident Management System (NIMS) is a standardized approach to incident management developed by ...
8/11/2020 1:55:28 PM| 3 Answers
The Eighteenth Amendment, "Prohibition," was reversed by the _______ ...
Weegy: The Eighteenth Amendment, "Prohibition," was reversed by the TWENTY-FIRST Amendment. User: Under Article ...
8/11/2020 7:47:46 PM| 3 Answers
To be issued a motorcycle license you must have at least a regular ...
Weegy: To be issued a motorcycle license you must have at least a regular Class E operator's driver license. User: ...
8/4/2020 5:39:15 AM| 2 Answers
Leaking purple fluid indicates that you should check your A. Coolant ...
Weegy: a. coolant is right answer.
8/4/2020 3:10:57 PM| 2 Answers
GET
Answers.
GET THE APP.
weegy*
*
Get answers from Weegy and a team of really smart live experts.
S
L
P
L
P
Points 1027 [Total 7050] Ratings 1 Comments 1017 Invitations 0 Offline
S
L
Points 926 [Total 3923] Ratings 2 Comments 906 Invitations 0 Offline
S
L
P
R
P
R
L
P
P
C
R
P
R
L
P
R
Points 903 [Total 12994] Ratings 1 Comments 633 Invitations 26 Online
S
L
P
1
Points 757 [Total 3613] Ratings 3 Comments 727 Invitations 0 Offline
S
L
Points 500 [Total 1993] Ratings 2 Comments 480 Invitations 0 Offline
S
L
Points 318 [Total 4702] Ratings 1 Comments 308 Invitations 0 Offline
S
L
1
Points 219 [Total 3530] Ratings 3 Comments 189 Invitations 0 Offline
S
L
Points 173 [Total 324] Ratings 4 Comments 133 Invitations 0 Offline
S
L
L
Points 121 [Total 5409] Ratings 3 Comments 91 Invitations 0 Offline
S
L
Points 85 [Total 244] Ratings 0 Comments 85 Invitations 0 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.