Preview

free elc

Satisfactory Essays
Open Document
Open Document
611 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
free elc
Search for any article in the internet or for a certain company, institution, organization, etc.. which has a case/scenario related to Information Security Threat or Information Security mismanagement.

Make this as a case study by pointing out the following in your paper.
1. Narrate what were the specific problem(s) encountered related to information security.
I have been using Joomla for years now and still love it. My site was hacked recently and no real damage was done just an homepage redirect and site title changed.

To be honest my Joomla was kept pretty clean, the only addons I had were a contact form, calendar, and forum. They were updated too!

Here is what the hacker left.

The disturbing thing is this guy is out to destroy Joomla, take a look what happens when I type his name () in google.

The only thing I am unsure about was the file settings I assigned to files in "htdocs" with FTP. For instance I set permissions to some folders to 777, but didn't think that effected web users.

Anyway Just thought I'd put his name or so called name on this forum so we have a note of him.

2. Who were the person(s) involved and their responsibilities and how they contributed to the problem.

Dean Marshall Consultancy's team of professional security experts understand web technology. As experts in the Joomla CMS, you can trust us to help you with all of your website security needs. Contact us now for our Joomla security services and we could harden the security of your existing website, offer security advice about your server set-up and best practise for website administrators.

3. How would you able to solve the problem if your are an information analyst....
Security is an ever growing concern for website owners, especially websites that use Content Management Systems such as Joomla. Content Management Systems give you the power to manage a website with ease, giving you access to a wide number of files that you put within your website (at

You May Also Find These Documents Helpful

  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    CMGT 442 Complete Class

    • 1220 Words
    • 8 Pages

    Based on the Barr, J. (2010) article, what special issues must be addressed for a risk management strategy that supports user-facing Web-based systems? What are the risks associated with disruption of these systems?…

    • 1220 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system.…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    4. What is the Apache Web Server? Review the /etc/httpd/conf/httpd.conf configuration file, and point out a setting that could enhance security.…

    • 316 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    5. Groups trying to move to new areas where they were not looked at in a good like caused conflict between the groups.…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Physical Security

    • 272 Words
    • 2 Pages

    This paper is to outline Riordan Manufacturing’s existing Information Security Systems, determine their weaknesses, and develop solutions to those weaknesses by addressing security issues in the areas of physical, network, data, and the web.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Metadata

    • 264 Words
    • 2 Pages

    Siglin discusses Dreamweaver and how there was a previous tool named “Contribute” which was for an average user can make simple updates to a website, and the second tool which “lets tables created in word and saved out as HTML” talks about how the suite has allowed for improved database management and enhancement in how content can be updated on a website…

    • 264 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Database Security: This section includes information about security issues with MySQL databases and Oracle databases.…

    • 1593 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    The first word, we would like to show our deep gratitude to Dr. Pham Van Hau – school of Computer Science and Engineering – our advisor for suggesting us this interesting topic as well as his willingness to support us throughout problems. His comprehensive knowledge and much experience help us finish this thesis successfully. The second word, we would like to give thank to the School of Computer Science and Engineering, together with the staffs for offering us a chance to work on this thesis for our graduation. Thanks for all the technical support and enthusiasm. Sincere thank to our team partner because of his hard work and cooperation. Ho Chi Minh city, May 2010…

    • 11979 Words
    • 48 Pages
    Powerful Essays
  • Satisfactory Essays

    What is hacking? (2012). Retrieved November 24, 2012 from What is my IP Address website,…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Abstract: Web security is in general taken as providing safeguard at the borders of an organization by keeping out impostors. For this…

    • 3825 Words
    • 16 Pages
    Best Essays
  • Powerful Essays

    Cyber security is the burning concern today causing a panic attack on businesses and individuals. Majority of the adults shop from e-commerce websites. Therefore, securing a site from hackers is paramount or else the firm will lose its customers and their business will go down drastically.…

    • 969 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    - RocketTheme's business-critical information system has a user base of well over 40,000 registered members because of its international orientation and collaboration. All communication and information exchange between the employees of RocketTheme and its customers is preformed using the electronic superhighway. RocketTheme attracts its customer from all over the globe like its team, its customer come from different backgrounds,different age groups and different countries. The target group of customers is in essence, anyone who wishes to run a Web site using the Joomla CMS.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Websites with Joomla

    • 48382 Words
    • 194 Pages

    Author Hagen Graf Translator Wolfgang Spegg Senior Acquisition Editor Louay Fatoohi Technical Editor Akshara Aware Editorial Team Leader Mithil Kulkarni Project Manager Abhijeet Deobhakta Cover Work Shantanu Zagade Project Coordinator Brinell Lewis Indexer Monica Ajmera Proofreader Chris Smith Production Coordinators Aparna Bhagat Shantanu Zagade…

    • 48382 Words
    • 194 Pages
    Good Essays
  • Good Essays

    sql injection

    • 1742 Words
    • 12 Pages

    Perumal, V. ; Gowraj, N. ; Kannan, R.S. ; Thinakaran, P. ; Ganapthi, S. ; Gunasekaran, J.R. ;…

    • 1742 Words
    • 12 Pages
    Good Essays