Monday, November 4, 2019

Vulnerabilities of Organizational Networks and Internets Coursework

Vulnerabilities of Organizational Networks and Internets - Coursework Example This paper analyses and studies the various security weaknesses which hampers the organization’s information system. A brief study of the technical and non technical measures and methods are listed which would ensure that the company or the organization is protected from any unauthorized access to their system. Definition and Impact of Vulnerability on an organization The Organization of Internet Safety defines security vulnerability as â€Å"security vulnerability is a flaw within a software system that can cause it to work contrary to is documented design and could be exploited to cause the system to violate its documented security policy† (Telang and Wattal, 2005, p2). Vulnerability is security weakness in the software or the hardware on a system or a server that can be attacked or gained access to, by an intruder. The weakness or the loophole can be physical, technical or network related (Kizza, 2007). In today’s tough and competitive marketplace, it is imper ative for all the organizations to have strong measures against all anticipated vulnerabilities. Companies stand a risk to lose time, money and may hamper its future growth, if the concept of vulnerability management is not adhered to and practiced. For example, a security defect in any software may cause loss of millions of dollars in terms of downtime, integrity issues and interrupting the growth of the organization (Brackin, 2003). Vulnerabilities of Organizational Networks There are various sources of system vulnerabilities. Poor design flow, improper use of the firewall, the nature of intruder activity, improper security management, no restriction in the usage of internet, improper implementation of the security appliances are some of the major causes of IT vulnerability. In an organization, the two major components of a computer system, hardware and software are quite vulnerable (Kizza, 2007). An organization uses the computers for almost each and every sphere of activity. Thi s enables the companies to have the ability to use and practice internet in their day to day operations. The most common cyber security vulnerability IT mangers are facing in terms of their software design flows. Software are more prone to security losses for their less complexity, involvement of the human factors, lack of security equipments while testing and implementing the software programs. The software professionals often have a rush to finish the product. There are some attention failures possible on the part of the professionals, for example, if they forget to add some security verification questions, it becomes accessible to many unauthorized ones. A software program may have many possible outcomes. It is important to choose the best fit and the correct to be used. There might be some malice professionals in the company. Many viruses, bugs are downloaded in software and then are circulated and transferred from one computer to another. Some security software are difficult to locate and used. The software product needs to be thoroughly tested under all possible circumstances as no software product can fit in all environments. In almost all the organizations, Local area networks (LANs) is being used and implemented in meeting data processing and to work in tandem with other companies in the global

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.