You are on page 1of 1

BREACHING OF DATA

The objective of the research is to share the awareness to those unenlightened ones about the issues concerning the platform vulnerabilities that contributes in excessive and malicious database breaching and compromising of the data. The malicious attackers and malevolent hackers are restless and always seek new bug and weaknesses of an operating system nowadays. They constantly attack and hack in order to perform their malicious deeds that could compromise the data of the database. People should be aware of this and do the same: they should constantly guard their systems, strengthen the wall that acts as defences, seeking weak spots of the security and patching it up before the attackers and hackers penetrate it. But what if the problem is your operating system? What if the attackers and hackers saw weak spots in the operating system that breach your systems security and compromises your confidential data that these attackers can use against you and against your will? In order to know more and gain in depth knowledge about the issue, the proponent set objectives that should be followed in order to gain possible answers and prevention from the said attack.

You might also like