21 Aug Write a thread containing a thoughtful answer to
Write a thread containing a thoughtful answer to 1 question. Answer should contain at least 400 words. If necessary, you may list within your thread any concepts on which you need further clarification as well. Also, you must reply to at least 2 threads below. Each reply should contain at least 200 words. Additionally, all posts (thread and replies) should reflect professional writing, current APA standards, include at least 1 scholarly reference (e.g., peer-reviewed journal articles), and integration of at least 1 biblical principle.
Thread Question:
Describe what the overall goal of protecting confidentiality is. (in 400 words at least)
Replies(Reply to each thread in at least 200 words EACH)
Thread #1
Sloppy Coding Risks
When doing anything really it should always include some type of organization and correct formats and the best practices to be as close to perfection as possible to get the best results. Coding is no different in this aspect than anything else. Keeping it organized and we documented and with the standard and correct functions and scripts in place for the application. If theses are not followed there are many risks that can come along with it like, incorrect usability, none-reusable or editable code, and possible malicious attacks from sloppy code can really affect an organization.
Sloppy coding can really make the difference between an amateur programmer and a professional in the world of IT. Most companies probably don’t think of the risks that could come from something as simple as sloppy coding, but a big main problem could be incorrect coding. By just typing code and trying to get something to work a function or certain syntax could throw off the program itself and would thus make the end product incorrect and end up wasting time. Another issue that I can speak about from experience is that sloppy coding makes the code or program none-reusable or sometimes even editable for fixes or other uses. From my experience companies end up having to just re-create programs or scripts because the original is out-of-date or is so poorly written in terms of syntax or documentation within the code itself. This causes companies to waste time and money to make better program instead of fixing their originals which is an unnecessary risk. One last risk to note is that form sloppy coding malicious attacks can happen for various reasons. Sloppy coding can leave open gaps for injections of XML or SQL attacks. An article even noted about how banks were being affected by it, “We found that overall, organizations are taking application security quite seriously. However, there are clear outliers to this broad finding that put companies and their customers at significant risk” (Poor coding., 2017). This shows that even banks are re-evaluating their codes because of sloppy coding.
Something that always comes to mind is a specific bible verse when it comes to the work place and dealing with problems like sloppy coding and that is this, “Whatever you do, work at it with all your heart, as working for the Lord, not for human masters” (Colossians 3:23 NIV). This verse always causes me to rethink my actions and helps me to try and ensure things like sloppy coding, that could cause many problems; are prevented and only my best work is done.
Thread #2
Bad News for a PC
A key logger is software that is installed, either intentionally to monitor individual’s computer movement or by accident when malicious intent is involved, to track all key strokes and/or mouse movement that is made by an individual on an infected computer. This information can be used later to steal user-names and passwords or any other sensitive information entered by the individual. Key loggers can be hard to detect, and they can cause great deals of damage before individuals even know there is a problem. An example of a key logger attack occurred in 2016 when “companies from 18 countries where key employees were targeted with emails that contained a commercial keylogger program called Olympic Vision.” (Constantin, 2016). This allowed the attackers to request funds to be sent to nonexistent businesses for the attackers benefit. Although most key loggers today are software, a key logger can also be a piece of hardware connected between the computer and the keyboard/mouse.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.