Common Network Vulnerabilities
(The effects of the absence of knowledge on unencrypted communication:
Setting ground rules for an organizations internal structure)
“Businesses, governments, and other organizations face a wide array of information security risks. Some threaten the confidentiality of private information, some threaten the integrity of data and operations, and still others threaten to disrupt availability of critical systems” (Sullivan, 2009). Since such security risks are always going to present in the cyber world, businesses and organizations need to fully be aware of any vulnerabilities in their systems. The initial realization of any organization’s vulnerability can only first be understood through the knowledge of what vulnerability means. A vulnerability is a security weakness but not a security threat. It is what needs to be assessed in order to examine an organization’s network. One of the main network vulnerabilities facing IT managers today is the absence of encrypted data being transferred and received between uninformed users and the lack of knowledge and understanding within an organization’s internal structure.
Network vulnerabilities are present in every system and with the constant advancement in knowledge, programs, and technology; it can be extremely difficult to rid all vulnerabilities in any infrastructure. Whether it is implementing hardware or beefing up software security, no one method of protecting a network can be greatly increased unless the users and IT professionals behind the update are up to speed on what is happening. To begin, all users in an organization or business need to be aware. Be aware of your surroundings. Be aware of the software that you use on a daily basis, and the information that is being passed between everyone. Security awareness in any infrastructure needs to be the center of any cyber security business program. “In many respects, the
References: Amoroso, E. G. (2011). Cyber attacks: awareness. Network Security , 2011 (1), 10-16. doi:10.1016/S1353-4858(11)70005-8. Beidel, E. (2011). Protectors of Critical Networks Look Within For Vulnerabilities. National Defense , 96 (693), 36. Retrieved from EBSCOhost. John, S. L. (n.d). Cybersecurity Vulnerabilities. FDCH Congressional Testimony . Retrieved from EBSCOhost. McLaughlin, K. (2006, April 28). CompTIA: End-User Training Is Critical To Security. Retrieved October 9, 2011, from CRN: News, Analysis, and Perspective for Vars and Technology Integrators: http://www.crn.com/news/security/186701275/comptia-end-user-training-is-critical-to-security.htm?itc=refresh Petit, F., & Robert, B. (2010). Concepts to Analyze the Vulnerability of Critical Infrastructures - Taking into account Cybernetics. Journal of Systemics, Cybernetics & Informatics , 8 (1), 64-66. Retrieved from EBSCOhost. Sullivan, D. (2009). Common Vulnerabilities in Business IT Systems. San Francisco: Realtime Publishers. Vanderwerken, J., & Ubell, R. (2011). Training on the cyber security frontlines. T + D , 65 (6), 46-50. Retrieved from EBSCOhost.