This website uses cookies to ensure you have the best experience. Learn more

Single Most Importan Cybersecurity Vulnerability Essay

3016 words - 13 pages

Single Most Important Cybersecurity Vulnerability
Facing IT Managers

Disclaimer: please do not copy and paste the paper

With the growing usage of the Internet, the expansion of global communication, the office in its traditional sense is fading away. In order for corporations, whether small or large to be profitable in this competitive market, the walls of their offices have had to expand beyond the four walls located at their physical business address. In order to conduct business effectively nowadays, it has become necessary to have internal private business and government networks connecting to other corporate and government networks; as such, the use of portable devices has ...view middle of the document...

An authorized user must be able to enter their assigned user name and password to successfully connect to the network and access all documents they are allowed to view or edit. IT policies will usually determine the minimum length of the password, the frequency at which it should be changed, and whether it should include the use of special characters and/or numbers. Password policies can feel like a burden to some employees, and they resort to writing the password down because of the complexity of the password requirements. This is a very unsafe practice; anyone could observe where a particular employee saves this password and take it, or just search until they find it. Crackers are persistent, and will search until they find something of value to break in the targeted network.
Another weakness commonly exhibited by legitimate network users is to leave their desk without locking their computers. This behavior gives anyone passing by the opportunity to view confidential data. Most times, if this behavior has been often repeated without incidences, the employees believe that their environment is quite safe, trustworthy, giving them little reasons for worries. Nowadays, many employees connect to unsecured wireless networks using their corporate (or approved personal) wireless devices, but are unaware of the possible threats associated with this behavior. The use of portable and mobile devices has increased the chances of malicious attacks. First, simply losing a mobile device can cause personal and even corporate data to be stolen and compromised. Personally identifiable data can be recovered on the device and be used to gain access to sensitive data. Secondly, when using smartphones, tablets, and laptops in public places, especially when connected to unsecured wireless access points, others can capture a password or other private information, which they could instantly exploit to gain access to sensitive information. Indeed, hackers and even non-technical people, who have a wealth of information readily available on the internet, can use specific tools to successful sniff wireless signals, and retrieve useful data in order to perform an attack against unsuspecting users.
When crackers are unable to exploit system vulnerabilities, they pursue penetrating a network by using social engineering techniques (Goodrich, 2011, p.43). The Cybersecurity handbook describes it as “attacks that take advantage of human nature to compromise a target, typically through deceit.”(p.60). With social engineering, an attacker uses impersonation (or pretexting) to establish direct contact with users in order to retrieve small pieces of information to bypass security measures, and penetrate a computer system. When pretexting, the hacker claims to be someone they are not, and gains another employee’s trust either under the pretext of an urgent or an important situation. The hacker can pretend to be another department’s employee, an executive, a desktop support...

Other Papers Like Single Most Importan Cybersecurity Vulnerability

Web Server Security And Database Server Security

2494 words - 10 pages (2011). Various high-profile hacking attacks have proven that web security remains the most critical issue to any business that conducts its operations online (Siddharth & Doshi, 2006). Web servers are one of the most targeted public faces of an organization, because of the sensitive data they usually host (2006). Securing a web server is as important as securing the website or web application itself and the network around it (2006). These

Natural Disasters And Poverty: Example Of Haiti And Chile

968 words - 4 pages There is a growing concern that disasters are on the rise around the world and especially in developing countries, where years of development gains can be single-handedly wiped out when a single event occurs (Wisner 2006, 6). The sudden spate of disastrous earthquakes in the Americas cause concerns. Within a span of 45 days, two earthquakes hit Haiti and Chile. An earthquake, measuring 7.5 on the Richter scale, rocked Haiti on January 12, 2010

Brazil

1445 words - 6 pages portion of its population (approximately 28 million Brazilians have internet access, the highest rate in Latin America), due to an increase in telephone services, particularly in the case of prepaid mobile telephones. In addition, the development of a specific model of digital television makes the Brazilian market a gigantic laboratory for the use of applied technology. Furthermore, Brazil has the largest and most diversified system of science

Police Operations

1336 words - 6 pages and nightfall affects the rhythms (Psychology Today 2009). When the rhythm is interrupted by rotating shifts, it cause sleep disorders and unhealthy eating patterns. This can also add to the chances of an officer involved wreck. In reference to eating, what happens is the officer will get sleepy and to combat this feeling, he or she will grab something to eat. If the officer is on nightshift, after a certain time most places to get something

Kudler

1121 words - 5 pages new and current systems like POS, CRM, financials, purchasing, sales, and inventory management into a single centrally managed solution. There is currently a growing threat for POS systems and Kudler’s reliance on third- party services may create some security vulnerability issues. We suggest implementing higher levels of security to defend against security threats such as application whitelisting, (use of anti-spam filtering software to

Manage Risk

2750 words - 11 pages letter allowing them to leave any meeting at no later then 3:00pm every day. ● Replace the dishwasher with a 5–6 stat (WELS) rating. ● Have Goldsmith Partners apply for time to ‘make good’. RISK ANALYSIS AND MANAGEMENT PLAN 1. A) Likelihood: Once risks are identified, the next step is to determine the likelihood that the potential vulnerability can be exploited. Several factors need to be considered when

Can Small Developing Countries Survive In A Globalised Environment

3615 words - 15 pages  decades of multilateralism in trade. Available at     1 Page 4       Challenges of globalisation for Caribbean islands Both the Commonwealth Report on Small States’ Vulnerability and the recent UN reports suggest that globalisation is the greatest source of vulnerability for small developing countries2. The islands’ small size is certainly a relevant factor in the current phase of globalisation. But there are both advantages and

Lust Is Easy, Love Is Hard, Like Is Most Important

1412 words - 6 pages , there is no point in you closing your eyes or shutting your ears and pretending that the world is moving forward but my kid is still ancient. Wake up. Whatever happened to the human and genuine touch to concepts such as keeping love? And please if you are planning on blaming the generation, trust me there is no such thing as generation. Its fast moving reality and it is largely impossible to find just a single most evident factor to blame for

Iphone 5 Report

4153 words - 17 pages mostly led to indifference given the fact that it not differentiated that much from iPhone 4s. Most consumers regard it as disappointment (Appendix 10). It is a recent product so there is a little evidence to what extent it has or will achieve success in the market and a further research should be conducted. Its success depends on both Apple’s abilities to retain its customers and prove the absolute advantage of iPhone 5 over its competitors

Dementia Treatment

2450 words - 10 pages families or caregivers. In order to better understand dementia and those who suffer from it, let’s look at potential strategies and challenges to engage dementia clients, how to conduct a biopsychosocial assessment of dementia clients, and take ethical consideration into account in respect to a single client that I have chosen, EP. EP is a sixty-nine year old African American female who was previously diagnosed with dementia as well as depression

Research With Prisoners

2488 words - 10 pages involved in four categories of research. Most social and behavioral sciences research falls into the first two categories: 1 Study of the possible causes, effects, and processes of incarceration, and of criminal behavior, provided that the study presents no more than minimal risk and no more than inconvenience to the subjects. 2 Study of prisons as institutional structures or of prisoners as incarcerated persons, provided that the study

Related Essays

Mid Term Cis 333 Essay

1036 words - 5 pages Collaboration All of the above 2.5 points Question 3 Which of the following is a weakness that allows a threat to be realized or to have an effect on an asset? Answer Risk Threat Vulnerability Downtime 2.5 points Question 4 In which domain of a typical IT infrastructure do service level agreements (SLAs) figure prominently? Answer LAN LAN-to-WAN WAN Remote Access 2.5 points Question

Principles Of Information Security 4th Ed Chapter 1 Review Questions

801 words - 4 pages Kevin Kovack Chapter 1 Review Questions 1. What is the difference between a threat agent and a threat? A threat is a constant danger to an asset, whereas a threat agent is the facilitator of an attack. 2. What is the difference between vulnerability and exposure? Vulnerability is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or damage

On The Development Of Comprehensive Information Security Policies For Organizations

3359 words - 14 pages Annotated Bibliography Assignment 1 Gary L. Williams Information Assurance Research Literature RSC 830 January 20, 2015 Dr. Emily Darraj Annotated Bibliography Assignment 1 The purpose of this assignment is to examine the topic cybersecurity via an annotated bibliographic review of multiple dissertations. This assignment will work toward the identification of a future dissertation topic within this field and also towards the

Stress And Illness Essay Psychology

404 words - 2 pages Outline and evaluate research into the relationship between the immune system and stress related illness (12 marks) Taylor McAndrew AO1 Cohen et al (1993) investigated the role of general life stress on vulnerability to the common cold virus. He found that the chance of developing a cold, i.e. failing to fight off the infection, was significantly correlated with stress index scores. Cohen et al. concluded that life stress and negative