Friday, March 15, 2019

Common Vulnerabilities Facing IT Managers Essay examples -- Informatio

Vulnerabilities be like a thorn in the side of every hotshot organization doing business today. In the IT world vulnerabilities are bugs or flaws, a weakness, or an exposure of an application, system, device, or service which could lead to a disaster of confidentiality, integrity, or availability (Liu & Zhang, 2011). They are to companies today what the black plague was to atomic itemise 63 in the 1300s. It doesnt even matter if the organization is connected to the mesh or not its still vulnerable to some event of attack. Regardless of what a company actually produces and what its mission statement states their number one internal concern is vulnerability. How do IT Departments and IT Managers combat these threats? both company has some type of Cyber Security team or department. Cyber auspices is defined by the United States Computer Emergency Readiness police squad as protecting that information by preventing, detecting, and responding to attacks (McDowell & Househ older, 2009). Every year companies expire billions upon billions of dollars in cyber security assessing and combating possible vulnerabilities of their organizations hardware and software systems, transmission media, local anesthetic area networks, wide area networks, enterprise networks, Intranets, and Internet. This paper will estimate 3 companys networks and assess their vulnerabilities. Company AWeebles, Inc has several(prenominal) hundred employees in their main office and two hundred at the shipping plant just a few miles away. The LAN or topical anaesthetic Area Network uses 100 gb/1000gb connectivity speeds over Ethernet circuits. Local Area Networks cover small geographical locations and enable individual computers to submit with each other to share information (Pang, 2011). The Wid... ... external IP address. plant life CitedLiu, Q., & Zhang, Y. (2011, March). VRSS A new system for rating and scoring vulnerabilities. Computer Communications, 34(3), 264-273. Ret rieved June 08, 2011, from Computers & utilize Sciences Complete.McDowell, M., & Householder, A. (2009, May 6). Cyber Security Tip ST04-001. In US-CERT. Retrieved June 08, 2011, from CSEC610 9041 Webliography.Valacich, J, & Schneider, C. (2012). Information Systems Today Managing in the Digital World 5th Edition. (pp. 12-37). Pearson. ISBN-13 978-0-13-706699-5.UMUC. (2011). Custom Textbook for CSEC 610 (pp. 1-13). Hoboken, NJ stern Wiley & Sons, Inc. ISBN 978-0-470-92331-3.Pang, L. (2011). The vulnerability of information systems in CSEC610. Course module 2 post in University of Maryland University College CSEC 610 9041 online classroom, archived at http//webtycho.umuc.edu

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.