Answered You can hire a professional tutor to get the answer.
Instructions Write a thread containing a thoughtful answer to 1 question. Answer should contain at least 400 words. If necessary, you may list within your thread any concepts on which you nee
Instructions
Write a thread containing a thoughtful answer to 1 question. Answer should contain at least 400 words. If necessary, you may list within your thread any concepts on which you need further clarification as well. Also, you must reply to at least 2 threads below. Each reply should contain at least 200 words. Additionally, all posts (thread and replies) should reflect professional writing, current APA standards, include at least 1 scholarly reference (e.g., peer-reviewed journal articles), and integration of at least 1 biblical principle.
Thread Question:
Describe what the overall goal of protecting confidentiality is. (in 400 words at least)
Replies(Reply to each thread in at least 200 words EACH)
Thread #1
Sloppy Coding Risks
When doing anything really it should always include some type of organization and correct formats and the best practices to be as close to perfection as possible to get the best results. Coding is no different in this aspect than anything else. Keeping it organized and we documented and with the standard and correct functions and scripts in place for the application. If theses are not followed there are many risks that can come along with it like, incorrect usability, none-reusable or editable code, and possible malicious attacks from sloppy code can really affect an organization.
Sloppy coding can really make the difference between an amateur programmer and a professional in the world of IT. Most companies probably don’t think of the risks that could come from something as simple as sloppy coding, but a big main problem could be incorrect coding. By just typing code and trying to get something to work a function or certain syntax could throw off the program itself and would thus make the end product incorrect and end up wasting time. Another issue that I can speak about from experience is that sloppy coding makes the code or program none-reusable or sometimes even editable for fixes or other uses. From my experience companies end up having to just re-create programs or scripts because the original is out-of-date or is so poorly written in terms of syntax or documentation within the code itself. This causes companies to waste time and money to make better program instead of fixing their originals which is an unnecessary risk. One last risk to note is that form sloppy coding malicious attacks can happen for various reasons. Sloppy coding can leave open gaps for injections of XML or SQL attacks. An article even noted about how banks were being affected by it, “We found that overall, organizations are taking application security quite seriously. However, there are clear outliers to this broad finding that put companies and their customers at significant risk” (Poor coding., 2017). This shows that even banks are re-evaluating their codes because of sloppy coding.
Something that always comes to mind is a specific bible verse when it comes to the work place and dealing with problems like sloppy coding and that is this, “Whatever you do, work at it with all your heart, as working for the Lord, not for human masters” (Colossians 3:23 NIV). This verse always causes me to rethink my actions and helps me to try and ensure things like sloppy coding, that could cause many problems; are prevented and only my best work is done.
Thread #2
Bad News for a PC
A key logger is software that is installed, either intentionally to monitor individual's computer movement or by accident when malicious intent is involved, to track all key strokes and/or mouse movement that is made by an individual on an infected computer. This information can be used later to steal user-names and passwords or any other sensitive information entered by the individual. Key loggers can be hard to detect, and they can cause great deals of damage before individuals even know there is a problem. An example of a key logger attack occurred in 2016 when "companies from 18 countries where key employees were targeted with emails that contained a commercial keylogger program called Olympic Vision." (Constantin, 2016). This allowed the attackers to request funds to be sent to nonexistent businesses for the attackers benefit. Although most key loggers today are software, a key logger can also be a piece of hardware connected between the computer and the keyboard/mouse.
A virus is "computer code fragments that attach themselves to a legitimate program file on a computer" (Gregory, 2015), but the program file must be run legitimately by a user to actually work. There are many several different examples of viruses that affect many different types of files on a computer, but I will be talking about the direct action virus. The direct action viruses "attack certain types of files, typically .exe and .com files. The main purpose of this virus is to replicate and infect files in folders." (Hernandez, 2018). Although there are many different types of viruses, many, if not most, are detectable and curable using anti-virus software and built-in software provided by application developers. Also, in most instances, the information in the files can be restored after the removal of the virus or it was not damaged by the virus.
A worm is very similar in make-up to a virus, but there is one key difference: worms do not require a human user to activate a file. An example of a worm is the Morris worm. The Morris worm was created by Robert Morris to exploit "buffer overflow vulnerability in the 'finger' program on UNIX systems." (Gregory, 2015). Worms can be far more deadly than any virus because of the fact that they do not need to be executed. Along with being able to self-propagate, most of the worms created were able to cause great deals of data destruction on infected computers. Different worms work in different ways that range from bogging down a system substantially to deleting files that become infected with the worm.