Online KMWorld CRM Media, LLC Streaming Media Faulkner Speech Technology
Other ITI Websites
American Library Directory DestinationCRM EContentMag EMediaLive Enterprise Search Center EventDV Faulkner Information Services Fulltext Sources Online Intranets Today KMWorld Library Resource Literary Market Place Plexus Publishing Speech Technology Streaming Media

Support of this archive will be discontinued on December 31, 2017.
Basic Advanced Saved Help
Buy Complete Document: AbstractAbstract Full Text Full Text Page Image (PDF) Page Image (PDF)
Computers in Libraries - Westport
Subjects: Poisoning; Web sites; Search engines; Colleges & universities; Students; Learning; Computer viruses; Design; Poisons; Internet crime; Linux; Traffic congestion; Keywords
Author: Ajmi, Ayyoub
Date: Jun 2015
Start Page: 8
Pages: 4
Abstract (Document Summary)

Starting in the year 2014, people've seen an increasing number of cyberattacks targeting all sorts of organizations. These have cost the US economy billions of dollars and exposed the private data of millions of individuals. While most of them are designed to steal trade secrets, credit card information, or even celebrities' personal information, there are still other attacks targeting individuals and small organizations with the sole goal of spreading malware and promoting shady businesses. This is URL injection. The big lesson they learned from this experience is the need for a healthy cross-departmental collaboration. Teaming up with the main IT and security departments should have been requested from the beginning, even if it meant delaying the project a few more weeks or even months. But thanks to their alertness and expertise, we avoided the worst. One month after the incident, they had the Web site running and secure again. Another lesson learned is the necessity to ensure that the test environment reflects the live environment.

Buy Complete Document: AbstractAbstract Full Text Full Text Page Image (PDF) Page Image (PDF)

Most Viewed Articles  (Updated Daily)