Mile2 Cybersecurity Institute

Reply To: OCU C)ISSO A Discussion Lesson 12

#111628
Isabelle Tubbs
Participant

Back doors can be detrimental to a system. They allow an attacker to have access to a system without having the access rights or credentials to get in. They can access it at any time and access things they should definitely not be allowed access to. From there, a hacker can unleash many different types of threats and obtain sensitive information. Security Officers must be aware of the dangers of back doors and prevent these types of attacks in their security planning and measures. Before software is deployed, any threats that may potentially linger on the system must be removed. Also, a security officer must learn the different ways a back door can be created on a system. For example, a back door can be created using a Trojan horse or SQL injections. Educating users on what actions to avoid so that they do not compromise a system can prevent Trojan horses from being effective. Using the tools to check data that is put into a site and ensuring its safety before accepting it can prevent SQL injections. Actions like these can prevent large consequences.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.