Friday, June 14, 2019

Cyber Security Vulnerabilities Essay Example | Topics and Well Written Essays - 3500 words

Cyber Security Vulnerabilities - Essay ExampleAs per Gartner, 70% of security system incident occur internally i.e. from the organization premises (Dickerson, 2004). Likewise, in September 2004, HFC bank that is one of the largest banks in the UK sent an email to their 2600 customers mentioning that an internal in operation(p) error has made recipients email address visible to bothone within the email. Consequently, out of office feature was triggered from some of the customers and their personal phone numbers and other lucubrate were shared with each other (Dickerson, 2004). This shows that even simplest of mistakes can lead to an even bigger problem. As information systems are now considered as the fundamental function, every organization acquires information systems for occupation automation, better customer service and ROI (return on investment). Moreover, electronic commerce has also introduced many businesses that are only virtually present. For instance, virago that is an online store for selling books generates revenue from the Internet. Customers pay via credit cards for the purchased books that are delivered to them. In this scenario, any sort of security breach may inject an SQL injectant or cross site scripting attack on the website can affect the business as well as customer confidence. ... It is the responsibility of the organization to comfort and secure data privacy. However, there is not a single law that states how to traction customer information. For this reason, organizations sell or trade customer information with business partners and even to third parties. Likewise, sometimes the sole purpose of this personal data exchange is funds. Although, every online organization has a privacy policy which states how they will handle and secure customer data but at the same time there is no verification criteria. In the following sections, we will critically esteem a single most cyber security weakness for IT managers within an organization . Likewise, our main argument will cover different domains i.e. the local area network, applications, hardware, transmission media, first step networking, intranet, extranet etc. As per (Libicki, 2009) In theory, all computer mischief is ultimately the fault of the systems owner if not because of misuse or misconfiguration, because because of using a system with security bugs in the first place. In practice, all computer systems are susceptible to errors. The divergence between design and polity is a consequence of the complexity of software systems and the potential for human error. The more than complex the system and they do get continually more complex the more places there are in which errors can hide Association and Weakness The above mentioned argument is indicating to a vulnerability resides within the system that can be utilized for hackers to gain access and is known as exploit. Apart from this inherent risk resulting from inadequate coding practices, human element is also considered as a serious threat that is not limited to hardware,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.