Wednesday, May 20, 2020
Cyber Security Vulnerabilities Information Systems And...
Cyber Security Vulnerabilities Abstract There are several cyber security vulnerabilities that organizations and individuals need to consider to protect the integrity and confidentiality of their computer systems and networks. These vulnerabilities include software and hardware, intranet, enterprise network, wide and local area network, and transmission media. This paper, therefore, focuses on software and hardware vulnerabilities as the most important and the reasons it is the most important. The paper further focuses on the risks associated with these vulnerabilities (software and hardware) and provides the recommendations on ways to manage the risks. Introduction Many organizations are struggling every day to protect the availability,â⬠¦show more contentâ⬠¦The hardware is susceptible to such threats as dust, soiling, humidity, rusting, and unprotected storage. Dust, humidity, soiling, and rusting can cause the physical components of a computer and other devices to crash and cease functioning, which can lead to loss of information. Additionally, unprotected storage can lead to unauthorized access to the computer system, which may cause a breach or even loss of the stored information. Software vulnerability refers to the errors or weaknesses that the cyber security attackers can subjugate to alter the normal functioning or behavior of a computer system. Most systems are used in multiple environments and by different users, therefore, any individual with malicious intentions can take advantage of that to launch attacks that can compromise the system leading to unpredictable damage and costs to the organization. There are some software vulnerabilities but the most common are; buffer overflow, cross site scripting, and SQL injection (Khan, 2012). A buffer overflow occurs when the written data present on the storage software surpasses a given capacity of the software component. The corruption of the new additional data may lead to malfunctioning of the system by allowing unauthorized individuals to inject malicious codes into the computer system. Cross-site scripting involves injection of codes into the web pages that are accessed by other computer users. A malicious attacker can access existing system controls through suchShow MoreRelatedCyber Defense And Security Issues789 Words à |à 4 PagesUnderstanding cyber defense and security issues such as cyber-crime and cyber-attacks ensure efficient functioning of information systems. Cyber-attacks are real, unexpected and increasing in numbers according to Naumovski and Kenkov (2014) cyber defense is emerging as a high priority with the increased use of information technology. Naumovski et al. (2014) noted that understanding cyber defense and security issues would ensure effic ient operation of information systems. Naumovski et al. (2014)Read MoreCyber Security And Cyber Attacks1503 Words à |à 7 Pagesof vulnerabilities and the number of threats that have could negatively impact organizations information security. A vast majority of organizations rely on computers and the internet to store its data. Cyber attacks can take place in a variety of industries that might the general population does not realize such as cellular communication services, airplane navigation systems, and medical record security. All of these organizations are in highly diverse industries but need to be aware of cyber threatsRead MoreCyber Vulnerabilities1352 Words à |à 6 PagesINTRODUCTION With cyber-attacks on the continuous rise, organizations public and private must address computer security vulnerabilities. SANS Institute has revealed ââ¬Å"unpatched client-side software applicationsâ⬠as the top priority vulnerability for organizations globally. In conjunction with unpatched client software, vulnerable ââ¬Å"Internet-facing web sitesâ⬠can result in an organizations infrastructure to be compromised. In this study I will address the issue of unpatched client software, the impactRead MoreEssay Impact of Cyber Security Vulnerability on Organizations1263 Words à |à 6 Pagesassailantsto command the internet server to a cultured lateral network that uses stuff like packet technique or immediate control depletion to collect private and trustworthy material from cyber security computersystems. Vulnerabilities or weaknesses seem to be in the customer software whois a fellow of an industry that uses it to get their tasks performed. The uncovered customer so ftware side is the most important cybersecurity vulnerability/ weakness that the IT community is facing nowadays. Since allRead MoreSupervisory Control and Data Acquisition System Attacks Essay854 Words à |à 4 Pages Cyber threats to the energy infrastructure are pervasive. Reports have indicated numerous attempts to enter the nationââ¬â¢s information technology architectures are credible. Is has become common today that threats come from many origins. Some threats are traced from intentional or accidental incidents. Likewise, some threats toward the energy infrastructures come from a disgruntled employee or points of origin traced from foreign nations, seeking opportunities to exploit or cripple the nationââ¬â¢sRead MoreCyber Attacks, Intrusion Attacks And Network Attacks1285 Words à |à 6 Pagessensitive data and information have the responsibility of ensuring that the data are secure. Ensuring that this particular data and information are secure will more than lik ely be the responsibility of the Information Technology Security Executive. These executives will be required to implement the protocol and, software that will deter and prevent the different types of attacks that their organization faces. Some of the attacks include cyber- attacks, intrusion attacks, network attacks, and socialRead MoreSecurity Assessment - Aircraft Solutions Essay examples1349 Words à |à 6 PagesCourse Project: Security Assessment and Recommendations ââ¬â Phase I amp; II Aircraft Solutions Table of Contents Executive Summaryâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..1 Company Overviewâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..1 Hardware Vulnerabilityâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...2 Policy Vulnerabilityâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..3 Hardware Solutionâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦4 Policy Solutionâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...5 Summaryâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦6 Executive Summary The purpose of this paper is to explore and assessRead MoreGovernment Regulation By The Private Sector Essay1570 Words à |à 7 Pagesother enemies. Unfortunately regardless of how innovative our government or private sectors have become with securing the network systems, the frequency and intensity of the attacks have only increased. Over the last decade, security breaches and cyber-attacks have highlighted how dependent our nation is on its critical infrastructure. It was concluded that a total of 54% of cyber-attacks targeted the US in 2013 (Watkins, n.d). Through experiences such as September 11, 2001, it has become apparent howRead MoreIs Data Breaching A Cyber Security? Essay1682 Words à |à 7 Pagesexposing confidential information the company holds into the hands of the hacker. This confidential information could be anything from credit card numbers to social security numbers, which is very dangerous if exposed to the wrong people wanting to obtain this information. I f information such as a credit card number is exposed to a hacker, the hacker can use this number to use the credit card and purchase items illegally. Likewise, if a hacker were to find someoneââ¬â¢s social security number, they couldRead MoreCyber Attacks On Maritime Targets1468 Words à |à 6 PagesThe frequency and severity of cyber-attacks on maritime targets increases every year. Often the damage is not discovered until years later. The cyber-attack on the port of Antwerp began in 2011 and continued until it was discovered in 2013. The Danish Maritime Authority was attacked in 2012 by a virus contained in a PDF (portable document format by Adobe). The virus spread throughout the Maritime Authorityââ¬â¢s network and into Danish government institutions before it was discovered in 2014. Reasons
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.