This website uses cookies to ensure you have the best experience. Learn more

Security Vulnerabilities And The Essay

2176 words - 9 pages

Employee’s Security Vulnerabilities and the
Affects on Organization’s Information Technology
University Maryland University College

Employee’s Security Vulnerabilities and the
Affects on Organization’s Information Technology
Cyber security vulnerabilities and threats are real and constant. Information technology breakthroughs have given our adversaries cheaper and often effective cyber weapons to harm U.S. computer networks and systems (Gen Alexander, 2011). Unfortunately, our adversaries are not our greatest vulnerability to cyber security or cyber space.
Cyber security is a branch of computer technology known as information security as applied to computers and networks. ...view middle of the document...

Therefore, each employee in an organization has a role and responsibility. Only three roles will be addressed; Chief of Information Officer (CIO), System Administrator (SA) and Employee.
The CIO is ultimately responsible to protect the organizations information systems against security vulnerabilities and threats. Threat is anything with potential to damage or compromise the communications infrastructure or some portion of it. (Macwan, 2004). Vulnerabilities are flaws that can be exploited by a malicious entity to gain access or privileges that are greater than those that are authorized on an information system. (ITL, 2005) They are also responsible to improve the employee’s awareness.
Employees should have a full understanding and adhere to the information systems user’s policy. The CIO must provide the best practice for successful security management policies. The policy must address stringent security guidance especially with the increase and demand for internet usage. Employees should know the potential vulnerabilities and consequences if it becomes a threat. Employees should also receive the proper technical and basic awareness training. Organizations must protect security technology and commit to proper training for their employees. An untrained employee could do more harm than an external hacker.
Here is an example of an employee at National Aeronautics and Space Administration (NASA) who was negligent and became complacent on with his duties. On April 12, 2006 NASA experienced a VIOP outage due to human error. The outage affected all VOIP services connected to its headquarters. A qualified technician made the mistake of deleting all VIOP phones versus the 19 required. The technician’s actions were due to his negligence and complacency. The headquarters were out of service for a period of 5 hours. NASA immediately made changes to their policy to guard against human error. System wide changes now require two technicians to minimize procedure errors. (Barrett, 2006)
Another area where employees must be proficient is password usage. Employee’s weak passwords can be vulnerability. Passwords are a primary means of authentication. Employees often use passwords that easy detectable. This can be prevented, if System Administrator (SA) makes it mandatory to have stringent password criteria. One example and the most frequently used are to have upper and lower case alphanumeric, numbers, and special characters. These passwords also should be changed every 30-60 days. The employees shouldn’t be able to reuse previous passwords. By setting these parameters it will make passwords less vulnerable to an attacker. Implementing these stringent password management rules, may cause some employees to have a difficulty remembering their passwords and tend to write them down. Employees also tend to reuse the same passwords to access different systems and sites. Writing down and using the same password(s) for multiple...

Other Papers Like Security Vulnerabilities and the

The Impact of Hiv/Aids on Food Security and Livelihood in the Southern Part of Africa

2769 words - 12 pages are likely to be affected by the epidemic. And approximately 95 percent of them live in develping countries. Food security HIV/AIDS takes its toll on food security in a number of ways. For example:   HIV increases fatigue and decreases work productivity, which means less food on the table. In households coping with sick family members, food consumption generally decreases. As adults fall ill, families face increasing medical and health care

Airport Security Improvements Before and After the September 11, 2001 Terrorist Attack

1210 words - 5 pages Running head: Airport Security Airport Security Improvements Before and After the September 11, 2001 Terrorist Attack Andrew Fuller South Carolina State University Abstract The purpose of this study is to research improvements that have been made since the September 11, 2001 terrorist attack and study airport security before September 11. According to ABC News 4 much has changed in our country over

The Effects of Cloud Computing on Enterprises N Terms of Cost and Security

1257 words - 6 pages . But platforms based on cloud computing will also have barriers like providing and maintaining security and having few privacy issues as most of the data can easily be shared among cloud and accesses by different devices ( David Linthicum,2014) So it is very important to maintain the correct authorization so the data won’t be misused. As mentioned about the important factors of cloud computing. This paper will be focusing on the cost and security

Gain Access to the Homes of Individuals, Deal with Emergencies and Ensure Security on Departure

1889 words - 8 pages specific time you did | |this and describe what you did on this occasion. | | | |1. |What are the specific security arrangements for leaving this service user on completion of a visit

Zero Day Exploit Csec 620

1259 words - 6 pages and hunters of the zero-day vulnerabilities. Buyers and sellers who have criminal intent operate another type of market called the “black market”. The other market is the “gray market” where sales of vulnerabilities are between government agencies and sellers (Bilge & Dumitras, 2012). Important security issues National interests and greater cyber-security needs have conflicted on many occasions, especially on issues such as disclosure of zero

Term Paper

601 words - 3 pages Identifying Potential Malicious Attacks, Threats and Vulnerabilities Networking Security Fundamentals – CIS 333 April 29, 2012 Identifying Potential Malicious Attacks, Threats and Vulnerabilities There are a myriad of potential threats and vulnerabilities that leave a system open to malicious attack, anytime you have a computer network that connects to the internet there is a potential for malicious attack so it is important that you know


273 words - 2 pages system software vulnerabilities • Desktop or laptop application software vulnerabilities and software patch updates • Viruses, malicious code, or malware infects a user’s workstation or laptop computer • User inserts compact disks, USB’s, or DVD’s into a organizations computer • User downloads photos, music, or videos via the internet • User violates Aup and creates security risk for the organization’s IT infrastructure Below are risk

Top Security Threats

752 words - 4 pages Top Security Threats Craig Gagne’ IS317: Hacker Techniques Tools and Incident Handling 12/15/2013 Hany Othman The report highlights dramatic increases in targeted attacks on enterprises; the continued growth of social networking sites as an attack distribution platform; and a change in attackers’ infection tactics, increasingly targeting vulnerabilities in Java to break into traditional computer systems. In

Assignment 1 Top Security Threats

699 words - 3 pages . While the new security architectures employed in today’s mobile devices are at least as effective as their desktop and server predecessors, attackers can often bypass these protections by attacking inherent vulnerabilities in the mobile platforms’ implementations. Unfortunately, such flaws are relatively commonplace - Symantec documented 163 vulnerabilities during 2010 that could be used by attackers to gain partial or complete control over

Principles Of Information Security

307 words - 2 pages 1. What is risk management? Why is the identification of risks, by listing assets and their vulnerabilities, so important to the risk management process? Risk management is the process of identifying risk, as represented by vulnerabilities, to an organization’s information assets and infrastructure, and taking steps to reduce this risk to an acceptable level. Each of the three elements in the C.I.A. triangle, introduced in Chapter 1, is an

Information Systems

1212 words - 5 pages Inside The National Infrastructure Marvin Phillips Jr. Professor David Belva SEC 310 Homeland Security Organization and Administration 2/4/2013 A computer attack may be defined as actions directed against computer systems to disrupt equipment operations, change processing control, or corrupt stored data. Different attack methods target different vulnerabilities and involve different types of weapons, and several may be within the current

Related Essays

Roosevelt And The Social Security Act

1067 words - 5 pages Roosevelt and The Social Security Act Southern New Hampshire University Roosevelt and The Social Security Act Franklin Delano Roosevelt was greatly influenced by the events of The Great Depression to pass a series of legislation. His most notable legislation that he signed into law was The Social Security Act of 1933. While Roosevelt’s original version of the bill was modified in order to pass congress, he was still extremely proud of its

Security And Confidentiality On The Internet

922 words - 4 pages Security and Confidentially on the Internet Introduction The Internet provides little protection of security or confidentiality. The use of firewalls (protects both incoming and outgoing communications) and encryption can help limit the risks. I will discuss below the topics of how security and confidentially affects us in our everyday lives. Cookies Cookies provide enhancements that make the Web easier to use. Most major sites use them

Security And Privacy On The Internet

1133 words - 5 pages Security and Privacy on the Internet There are a lot of articles in the newspapers these days about databases hacked, personal information stolen, bank accounts “cleaned out”, or credit cards erroneously charged. When it comes to security and privacy on the Internet, how well does the system protect the public? Are certificate based security protocols as safe as one is lead to believe? Will modifying the Internet Explorer’s settings provide

Sub Saharan Africa And The Challenge Of Food Security

1034 words - 5 pages poverty, which breeds food insecurity and other vices. It is expected that concrete measures would be put in place and implementation of such would not be neglected towards revamping the continent and setting it forth for greater development comparable to that of Asia and South America. Works Cited Devereux, Stephen, Simon Maxwell and eds. Food Security in Sub-Sharan Africa. London: ITDG Publishing, 2001. Harris, Nancy and ed. At Issue