Preview

Common Network Vulnerabilities

Powerful Essays
Open Document
Open Document
1764 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Common Network Vulnerabilities
October 9, 2011

Common Network Vulnerabilities

(The effects of the absence of knowledge on unencrypted communication:
Setting ground rules for an organizations internal structure)

“Businesses, governments, and other organizations face a wide array of information security risks. Some threaten the confidentiality of private information, some threaten the integrity of data and operations, and still others threaten to disrupt availability of critical systems” (Sullivan, 2009). Since such security risks are always going to present in the cyber world, businesses and organizations need to fully be aware of any vulnerabilities in their systems. The initial realization of any organization’s vulnerability can only first be understood through the knowledge of what vulnerability means. A vulnerability is a security weakness but not a security threat. It is what needs to be assessed in order to examine an organization’s network. One of the main network vulnerabilities facing IT managers today is the absence of encrypted data being transferred and received between uninformed users and the lack of knowledge and understanding within an organization’s internal structure.

Network vulnerabilities are present in every system and with the constant advancement in knowledge, programs, and technology; it can be extremely difficult to rid all vulnerabilities in any infrastructure. Whether it is implementing hardware or beefing up software security, no one method of protecting a network can be greatly increased unless the users and IT professionals behind the update are up to speed on what is happening. To begin, all users in an organization or business need to be aware. Be aware of your surroundings. Be aware of the software that you use on a daily basis, and the information that is being passed between everyone. Security awareness in any infrastructure needs to be the center of any cyber security business program. “In many respects, the



References: Amoroso, E. G. (2011). Cyber attacks: awareness. Network Security , 2011 (1), 10-16. doi:10.1016/S1353-4858(11)70005-8. Beidel, E. (2011). Protectors of Critical Networks Look Within For Vulnerabilities. National Defense , 96 (693), 36. Retrieved from EBSCOhost. John, S. L. (n.d). Cybersecurity Vulnerabilities. FDCH Congressional Testimony . Retrieved from EBSCOhost. McLaughlin, K. (2006, April 28). CompTIA: End-User Training Is Critical To Security. Retrieved October 9, 2011, from CRN: News, Analysis, and Perspective for Vars and Technology Integrators: http://www.crn.com/news/security/186701275/comptia-end-user-training-is-critical-to-security.htm?itc=refresh Petit, F., & Robert, B. (2010). Concepts to Analyze the Vulnerability of Critical Infrastructures - Taking into account Cybernetics. Journal of Systemics, Cybernetics & Informatics , 8 (1), 64-66. Retrieved from EBSCOhost. Sullivan, D. (2009). Common Vulnerabilities in Business IT Systems. San Francisco: Realtime Publishers. Vanderwerken, J., & Ubell, R. (2011). Training on the cyber security frontlines. T + D , 65 (6), 46-50. Retrieved from EBSCOhost.

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Sarbane-Oxley Act of 2002

    • 3019 Words
    • 11 Pages

    Kochems, Alane. “Who’s on First? A Strategy for Protection Critical Infrastructure. May 5, 2005. Accessed April 9, 2009 from: The Hertiage Foundation website at http://www.heritage.org/research/homelandsecurity/bg1851.cfm.…

    • 3019 Words
    • 11 Pages
    Best Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Product Liability

    • 1989 Words
    • 8 Pages

    In this age of endless lawsuits and litigation from everyone suing everyone else, one must ask the question "where does product liability end and consumer responsibility begin?" This question has been further complicated by occurrences that stretch to the most far-reaching ends of this spectrum, the spectrum ranging from strict product liability of the company to complete consumer responsibility. On the strict product liability of the company side, we have the cigarette industry where the CEOs of the largest cigarette companies denied that their product was liable for the cause of addiction. Almost all consumers know that the ingredient nicotine in cigarettes is addictive, due to extensive scientific testing and reports on this fact. What these CEO 's should have done was admit that they knew nicotine was addictive, and therefore made their product liable so as to give a fair warning to unknowing consumers. On the complete consumer responsibility side, we can examine the lawsuit where a man sued McDonald 's for over a million dollars because he spilled a cup of their coffee on his self and suffered burns. He claimed that McDonald 's was liable because there was not a warning on the lid that stated that the coffee was hot. In my opinion, this lawsuit should have never happened. The consumer is attempting to alleviate all of the responsibility from himself for spilling his coffee and pass it on to the producer of the product. Frivolous lawsuits such as this, as well as companies failing to consider the importance of product liability, have resulted in an increasing annual product liability bill. Last year alone $4 billion was spent on product liability lawsuits and settlements (McAdams, p.636). This staggering number suggests that maybe we need to reform our liability system. Ideally, we as a society would like to reach a happy medium between strict product liability of the company and complete consumer responsibility. If this occurred, lawsuits such as…

    • 1989 Words
    • 8 Pages
    Better Essays
  • Good Essays

    assualts

    • 689 Words
    • 3 Pages

    Today Cyber crime is no longer the domain of high school hackers but is populated by organized criminals, unfriendly nation states and terrorists. The problems we face are far more severe than compromised personal data. Our physical security is threatened by vulnerabilities in our electronic information systems.…

    • 689 Words
    • 3 Pages
    Good Essays