“THE SINGLE MOST IMPORTANT CYBER SECURITY VULNERABILITY FACING IT MANAGERS TODAY”
Bernadette R. Morrison UMUC, CSEC 610 Individual Assessment Dr. Sudesh Kannan March 31, 2013
Table of Contents
Introduction ...............................................................................................................................1
The Internet................................................................................................................................2
Users Who Lack the Knowledge of protecting their systems....................................................4
Why is Knowledge so important? .............................................................................................6
Potential Impacts........................................................................................................................7
Mitigation...................................................................................................................................8
Conclusion..................................................................................................................................9
References.................................................................................................................................10
Introduction
Cyber usage has become one of the leading digital infrastructures that run our world. We use these infrastructures through cell phones, TV’s, ATMs, and most importantly computer networking. Internet usage is growing every year, and every year more and more users log on which has become part of our everyday lives. Unfortunately, as we grow with technology so are those who are willing and able to use the internet against us. Cyber attackers/hackers try to use these resources against
References: BARTHOLOMEW, P. (1998, April 1). Easing TCP/IP network management with novell 's DNS/DHCP services. Retrieved april 29, 2012, from Techcenter: http://support.novell.com/techcenter/articles/ana19980402.html Brodfuehrer, B Dacey, R. F. (2001). Information Security: Weaknesses place commerce data and operations at serious risk: GAO-01-1004T. GAO Reports, 1, 37. Retrieved from http://www.gao.gov/new.items/d011004t.pdf DIPERT, R Evenson, J., Cofsky, J., & Almazan, A. (2010). The Art of Cyber War -- Asymmetric payoffs lead to more spending on protection. Chart. p. 66. Retrieved March 26, 2013 Government Accountability Office GAO Miniwatts Marketing Group. (2012, February 13). Internet World Stats. Retrieved from Usage and population Statistics: http://www.internetworldstats.com/stats.htm Obama, b Plunkett, D. A. (2013, March 14). Are We Ready To Defend Cyberspace? Webinar. Maryland. http://www.umuc.edu/securitystudies/events.cfm Schultz, E Technet. (2013). Security planing. image. Retrieved March 26, 2013, from http://technet.microsoft.com/en-us/library/cc723503.aspx VanDerwerken, J., & Ubell, R