Wednesday, May 1, 2019

Cyber Security Vulnerabilities Essay Example | Topics and Well Written Essays - 3500 words

Cyber Security Vulnerabilities - Essay ExampleAs per Gartner, 70% of shelter incident occur internally i.e. from the makeup premises (Dickerson, 2004). Likewise, in September 2004, HFC beach that is one of the largest banks in the UK sent an email to their 2600 guests mentioning that an internal operational error has made recipients email speak to visible to everyone within the email. Consequently, out of office feature was triggered from some of the customers and their personal phone numbers and different details were shared with each other (Dickerson, 2004). This shows that even simplest of mistakes layabout lead to an even bigger problem. As information remainss are now considered as the fundamental function, every organization acquires information organisations for business automation, get around customer service and ROI (return on investment). Moreover, electronic commerce has also introduced mevery businesses that are only near present. For instance, Amazon that is a n online store for selling books generates revenue from the Internet. Customers pay via credit cards for the purchased books that are delivered to them. In this scenario, any sort of bail breach may inject an SQL injection or cross site scripting storm on the website mickle affect the business as well as customer confidence. ... It is the responsibility of the organization to protect and secure data privacy. However, there is not a single law that states how to handle customer information. For this reason, organizations sell or trade customer information with business partners and even to third parties. Likewise, sometimes the furbish up purpose of this personal data exchange is funds. Although, every online organization has a privacy policy which states how they entrust handle and secure customer data but at the same time there is no verification criteria. In the following sections, we will critically evaluate a single most cyber security weakness for IT managers within an org anization. Likewise, our main argument will cover different domains i.e. the local area network, applications, hardware, transmittance media, enterprise networking, intranet, extranet etc. As per (Libicki, 2009) In theory, all computer mischief is ultimately the fault of the systems owner if not because of misuse or misconfiguration, then because of using a system with security bugs in the first place. In practice, all computer systems are susceptible to errors. The divergence between see and code is a consequence of the complexity of software systems and the potential for human error. The more complex the system and they do get continually more complex the more places there are in which errors can hide Association and Weakness The above mentioned argument is indicating to a vulnerability resides within the system that can be utilized for hackers to gain access and is known as exploit. Apart from this inherent risk resulting from forgetful coding practices, human element is also considered as a serious threat that is not particular to hardware,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.