IDS 200 Lecture Notes - Lecture 8: Usability, Sql Injection, Ideal Point
Document Summary
Spam accounts are created for a fake persona, typically to deceive or harm other users. Little to no personal information, posts, photos. "there are two kinds of businesses: ones that have been hacked and ones that don"t know it. " Because perfect security is impossible, managers must balance usability against security. The cost of added inconvenience for system users (i. e. , reduced usage up to abandonment) The expected damage caused by all attack attempts over time. At the ideal point, managers minimize the sum of security costs and attack damage. We"ll now cover several of the most notable types of security threats: Subsequently, we"ll discuss facebook"s past security breaches. Attempting to use every possible combination of password characters in order to gain access. Eventually could be a really, really, long time. Enforced delays or locking account after a number of failed attempts. In a well-designed system, not a severe threat.