The main purpose of security is to protect assets. Looking back into history, the big walls acted as a safeguard to a fortress or a kingdom. There were massive and strong doors which stopped any perpetuator from entering without permission. The same thing applies in the computer world, with the only difference being that it's virtual.
There are closed networks and open networks. The closed networks are available for a person who belongs to that entity. On the other hand, open networks are available for the rest of the people. Previously, networks were designed as closed for a set of people and sites which do not connect to other people. With the advent of personal computers, LANs, and the wide-open world of the Internet, the networks of today are more openAs e-business and Internet applications continue to grow, the key to network security lies in defining the balance between a closed and open network and differentiating the good guys from the bad guys .
There has been a drastic change in the economy in the last decade. Everything shifted from paper to computers and from manual to automatic, thus giving rise to computers and increasing reliability on them. Consequently, this gave rise to breaches in information system in companies as everything was computerized. All of the works were carried out through networking. Thousands of servers were being used to run a company. The financial transaction became more online.
According to a survey held by Princeton Survey Research Associates International (PSRAI) in 2010, 46% of U.S adults or 58% of internet users said they bank online. In 2011, 18% of cellphone owners said they have used their phone to check their balance or transaction business with a bank.
With the evolution of the new age, threats are evolving much faster than we can even imagine, and businesses are falling behind in order to cope with it. The companies do not have the right security measures to protect their system against security breach. The threats possessed by attackers are very much severe. Thus businesses cannot take the risk of avoiding security measures and they must also consider some important threats that can harm their system to a great extent. Evolution of these social networking websites opened more doors to information breach. According to a survey held by Global information security survey (GISS), 60% of enterprise found their level of increased risk due to use of social networking, cloud computing and personal devices in the enterprise which resulted in an increase of 46% in their annual investment of information security.
Generally, attackers try to target small businesses for financial crimes. Small businesses are not prepared for such security breaches and end up losing millions of dollars to cope with their losses. According to FBI data cited in U.S. Senate testimony, annual cybercrime profits and damages have hit a trillion dollars. That's an incredible number and is impossible to itemize,...