ALL >> General >> View Article
Nasa Faces Security Breach

An attacker has exposed the security flaws on the website of National Aeronautics and Space Administration (NASA). The intruder, who identifies himself as TinKode, successfully gained access to the File Transfer Protocol (FTP) server associated with the space agency's Goddard Space Flight Center. The intruder has also placed screenshot of the affected server as evidence of the security breach on his website. The Romanian intruder has been in the news several times before for breaching the security of major websites such as the website of the Royal British Navy, and European Space Agency, The intruder was also behind the SQL injection attack on the website of MySQL, earlier this year. Fortunately, the motive behind the intrusion attempt by TinKode is to expose security flaws, rather than for any malicious purpose. However, making the security breach public, may make the sites susceptible to further attacks from cybercriminals. Cybercriminals constantly explore the cyber space to exploit security flaws on websites. Successful attack may allow attackers to gain access to confidential databases associated with the webpages. Leakage ...
... of privileged information from the sites of major scientific and research institutions may lead to strategic challenges and also threaten national security. Attackers also target websites to extract login credentials, personal and financial information, malicious scripts, and injecting malware.
Websites are susceptible to threats such as SQL injection and cross-site scripting attacks. SQL injection attacks aim at compromising the SQL-based database systems associated with the website. Attackers may alter the input by appending or terminating text strings, and inserting special characters. In case of cross-site scripting attack, cybercriminals insert malicious scripts on a legitimate website and infect the web browser of a user. Through cross-site scripting attackers may hijack user sessions, redirect users to a malicious website, and transfer cookies from a user's web application to that of a remote attacker.
Organizations must place high emphasis on website security. They must undertake regular evaluation of the sites through professionals qualified in IT degree programs, penetration testing and security audit. Regular review is crucial for identifying and weeding out security vulnerabilities. Appropriate input filtering and validation, output encoding, use of parameterized queries, allowing only those SQL statements that are required by the application and use of stored procedures may help in defending websites from SQL injection and cross-site scripting attacks.
Hiring experienced professionals qualified in online IT degree programs and secured programming may help in strengthening the defenses against sophisticated security threats. Information security professionals at research and critical installations must be encouraged to update their technical skills and know-how by undertaking online IT courses and participating in security conferences.
Add Comment
General Articles
1. Should You File Your Own Tax Return Or Hire An Accountant?Author: SATR accountants
2. News Paper Advertising- Part Of Company Promotion
Author: Gary Martin
3. How To Invest In Off-plan Property And Get The Uae Golden Visa
Author: luxury Spaces
4. Deadlines You Shouldn’t Miss For Self Assessment Tax Return 2025
Author: SATR accountants
5. Which Industries Gain Most From Web Application Development?
Author: david
6. Why Hire Top Newborn Photographers In Houston Today
Author: Family Moment
7. Future-proofing Your Business: Emerging Trends In Accounting And Tax Services
Author: DGA Global
8. Pipex.ai – A Complete B2b Portal For Industrial Product Sourcing
Author: Pipex.ai
9. Sathya Technosoft | Web Design Company India | Web Design India
Author: Sathya Technosoft
10. Why Local Dog Owners Choose Trusted Dog Boarding In Greeley, Co
Author: Mark Powell
11. Will An Online Mba Help You Switch Careers? Truth Explained
Author: University Guru
12. How Zoetic Bpo Services Delivers Verified Data Entry Bpo Projects?
Author: simon
13. Your Flight, Seamless From The Start: Inside The Korean Air Jfk Terminal
Author: milesmorales7693
14. Khelo 24 Bet App: Your Ultimate Guide To Khelo 24 Betting Id Number With Madrasbook
Author: Madrasbook
15. The Complete Guide To Ecommerce Design And Development
Author: Listany