IDS 200 Lecture Notes - Lecture 8: Usability, Sql Injection, Ideal Point

13 views8 pages

Document Summary

Spam accounts are created for a fake persona, typically to deceive or harm other users. Little to no personal information, posts, photos. "there are two kinds of businesses: ones that have been hacked and ones that don"t know it. " Because perfect security is impossible, managers must balance usability against security. The cost of added inconvenience for system users (i. e. , reduced usage up to abandonment) The expected damage caused by all attack attempts over time. At the ideal point, managers minimize the sum of security costs and attack damage. We"ll now cover several of the most notable types of security threats: Subsequently, we"ll discuss facebook"s past security breaches. Attempting to use every possible combination of password characters in order to gain access. Eventually could be a really, really, long time. Enforced delays or locking account after a number of failed attempts. In a well-designed system, not a severe threat.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers