Possible security issues with dataAnalyzing website: http://microdirect.co.uk
Brute ForceThe website could be brute forced, and all the members login details and bank accounts could be leaked.Most sites generally have protection against this, by restricting the amount of logins within a period of time on a IP address.
PHPThere are ways of exploiting PHP websites, which a hacker could gain access to the login details and leak information.
Viruses/Spyware/AdawareAll these things could copy private information from stored files and upload them to the attackers machine.
Weak PasswordIf the password is weak, the password could possibly be guessed by someone who may know some of the members of staff who work there.
ServerThere could be a theft and the server could be stolen. The theif could access the data and have access to thousands of bank details. To reduce the risk, the servers should be in a secure building, with a locked door to the server room.
PasswordsPasswords can be obtained by a few ways.Brute Force can be a way to crack the password, along with simply guessing the password.If you know the person, you may be able to guess their password. To prevent this, pick a password that isn’t easily guessable by anyone, and try and use numbers and symbols in  the password to make it harder to guess and a lot harder by a brute force attack.Passwords with numbers and symbols can change brute force attacks from hours into millions of years.
Access Rights & User PermissionsWithin a system, if the wrong access rights are given, it could give a user access to view data that they shouldn’t be able too, or it could give a user access to change or delete data.
Possible security issues with data

More Related Content

PPTX
Possible security issues with data
PPTX
Web Server Web Site Security
PPTX
Top 10 web server security flaws
PDF
Web Server Security Guidelines
PPTX
Web server security challenges
PPT
Introduction to Web Server Security
PPTX
Web security
PPTX
What's new in​ CEHv11?
Possible security issues with data
Web Server Web Site Security
Top 10 web server security flaws
Web Server Security Guidelines
Web server security challenges
Introduction to Web Server Security
Web security
What's new in​ CEHv11?

What's hot (20)

PDF
How to Keep Yourself secure while browsing internet pre null meet kolkata
PDF
Phishing Attacks: A Challenge Ahead
PPTX
Attack lecture #2 ppt
PPTX
Network Security
PPTX
Hass and associates cyber security
PDF
Attack chaining for web exploitation #c0c0n2015
PDF
Client /server security overview
PPT
Security communication
PPSX
Internet security terms and definitions
PPT
Software Security Testing
PPTX
Cyber security (daffodil international university)
PPTX
Slow Down Online Guessing Attacks with Device Cookies
DOCX
Sanjoy debnath resume
PPTX
Firewall
DOCX
Sanjoy_Debnath_Resume
PDF
Password Cracking using dictionary attacks
PPTX
Secure communication in Networking
PPTX
website phishing by NR
PPTX
Phishing Seminar By M Nadeem Qazi(MnQazi) pptx
PPT
Ch # 10 computer security risks and safe guards
How to Keep Yourself secure while browsing internet pre null meet kolkata
Phishing Attacks: A Challenge Ahead
Attack lecture #2 ppt
Network Security
Hass and associates cyber security
Attack chaining for web exploitation #c0c0n2015
Client /server security overview
Security communication
Internet security terms and definitions
Software Security Testing
Cyber security (daffodil international university)
Slow Down Online Guessing Attacks with Device Cookies
Sanjoy debnath resume
Firewall
Sanjoy_Debnath_Resume
Password Cracking using dictionary attacks
Secure communication in Networking
website phishing by NR
Phishing Seminar By M Nadeem Qazi(MnQazi) pptx
Ch # 10 computer security risks and safe guards
Ad

Similar to Possible security issues with data (20)

PPT
DB security
PDF
5db-security.pdf
PPT
Threats to data and information security
PPT
Threats
PPTX
Security_Concepts_Presentation on authorization.pptx
PDF
Creating Secure Social Applications
PDF
Health Information Privacy and Security
PPTX
Working of Google App Engine Cloud Computing.pptx
PPTX
Introducing Oracle Audit Vault and Database Firewall
PDF
Privacy is always a requirement
PPT
Website Security
PPT
Website Security
PDF
Health Information Privacy and Security
PPTX
INFORMATION AND CYBER SECURITY
PDF
Basic security concepts
PDF
Locking Down Your Data: Best Practices for Database Security
PDF
Health Information Privacy and Security
PDF
How to Destroy a Database
PPT
Updated Mvc Web security updated presentation
PDF
Computer Security
DB security
5db-security.pdf
Threats to data and information security
Threats
Security_Concepts_Presentation on authorization.pptx
Creating Secure Social Applications
Health Information Privacy and Security
Working of Google App Engine Cloud Computing.pptx
Introducing Oracle Audit Vault and Database Firewall
Privacy is always a requirement
Website Security
Website Security
Health Information Privacy and Security
INFORMATION AND CYBER SECURITY
Basic security concepts
Locking Down Your Data: Best Practices for Database Security
Health Information Privacy and Security
How to Destroy a Database
Updated Mvc Web security updated presentation
Computer Security
Ad

Recently uploaded (20)

PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PPTX
Configure Apache Mutual Authentication
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
The various Industrial Revolutions .pptx
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Module 1.ppt Iot fundamentals and Architecture
Convolutional neural network based encoder-decoder for efficient real-time ob...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Abstractive summarization using multilingual text-to-text transfer transforme...
Configure Apache Mutual Authentication
1 - Historical Antecedents, Social Consideration.pdf
Microsoft Excel 365/2024 Beginner's training
OpenACC and Open Hackathons Monthly Highlights July 2025
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Final SEM Unit 1 for mit wpu at pune .pptx
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Flame analysis and combustion estimation using large language and vision assi...
Consumable AI The What, Why & How for Small Teams.pdf
Hindi spoken digit analysis for native and non-native speakers
Chapter 5: Probability Theory and Statistics
The various Industrial Revolutions .pptx
2018-HIPAA-Renewal-Training for executives
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Enhancing emotion recognition model for a student engagement use case through...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game

Possible security issues with data

  • 1. Possible security issues with dataAnalyzing website: http://microdirect.co.uk
  • 2. Brute ForceThe website could be brute forced, and all the members login details and bank accounts could be leaked.Most sites generally have protection against this, by restricting the amount of logins within a period of time on a IP address.
  • 3. PHPThere are ways of exploiting PHP websites, which a hacker could gain access to the login details and leak information.
  • 4. Viruses/Spyware/AdawareAll these things could copy private information from stored files and upload them to the attackers machine.
  • 5. Weak PasswordIf the password is weak, the password could possibly be guessed by someone who may know some of the members of staff who work there.
  • 6. ServerThere could be a theft and the server could be stolen. The theif could access the data and have access to thousands of bank details. To reduce the risk, the servers should be in a secure building, with a locked door to the server room.
  • 7. PasswordsPasswords can be obtained by a few ways.Brute Force can be a way to crack the password, along with simply guessing the password.If you know the person, you may be able to guess their password. To prevent this, pick a password that isn’t easily guessable by anyone, and try and use numbers and symbols in the password to make it harder to guess and a lot harder by a brute force attack.Passwords with numbers and symbols can change brute force attacks from hours into millions of years.
  • 8. Access Rights & User PermissionsWithin a system, if the wrong access rights are given, it could give a user access to view data that they shouldn’t be able too, or it could give a user access to change or delete data.