Preview

CSEC 610 Individual Assignment

Powerful Essays
Open Document
Open Document
3199 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CSEC 610 Individual Assignment
CSEC 610, University of Maryland University College
July 12, 2014

Cybersecurity Vulnerabilities Facing IT Managers

Cybersecurity Vulnerabilities Facing IT Managers
Table of Contents
Introduction ………………………………………………………………………………………………………………… 3
Types of Vulnerabilities ………………………………………………………………………………………………. 5
Important Vulnerability, Impact & Solutions ……………………………………………………………….. 8
References …………………………………………………………………………………………………………………… 12

Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).
Before we get into the details let first examine what exactly is a security vulnerability. By definition a security vulnerability can be flaws in hardware, software, networks or the employees that use them which in turn can allow hackers to compromise the confidentiality, integrity and availability of the information system (“Common Cybersecurity,” 2011). To thoroughly discuss this topic in more detail I will first discuss Confidentiality as it is one of the three main goals of IT Security. Confidentiality is as simple as it sounds, limiting



References: Fonseca, J., Seixas, N., Viera, M., & Madeira, H. (2014). Analysis of Field Data on Web Security Vulnerabilities. IEEE Transaction on Dependable & Secure Computing, 11(2), 89-100 doi:10.1109/TDSC.2013.37 Russon, M Critical Security Controls. (n.d.). SANS Institute -. Retrieved July 12, 2014, from http://www.sans.org/critical-security-controls Ahlers, M Hobson, D. (2008, August 8). The real cost of a security breach. SC Magazine. Retrieved July 13, 2014, from http://www.scmagazine.com/the-real-cost-of-a-security-breach/article/113717/ Direct, M Rouse, M. (2007, May 1). DMZ (demilitarized zone). What is ?. Retrieved July 13, 2014, from http://searchsecurity.techtarget.com/definition/DMZ Shaffer, M

You May Also Find These Documents Helpful

  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    Bevis, J. (2007, July 12). Security Threats Statistics - Resources. Retrieved March 19, 2011, from InfoSecAlways.com: http://infosecalways.com/2007/07/12/security-threat-statistics-resources/…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Works Cited Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Single Most Important Cybersecurity Vulnerability Facing IT Managers Today CSSEC610 Professor Chun-I P Chen March 31, 2013…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Why Be Concerned about Cyber-Security? Introduction Cyber security became ever more crucial for global business and modern society. We are living in a data-centric world in which information technology and associated communications ' systems as well as networks that provide goods and services permeate every facet of our lives. This creates the safeguard of our digital assets and activities within cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex. We are increasingly dependent upon such information and communications infrastructures, and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Good Essays

    So much of everything is done now online over the internet. With this increase it has made it easier for countries, groups, individual’s etc with malicious intensions to intrude into peoples system. They then use the information that was found to steal or make unauthorized changes in sensitive information, commit fraud, or disrupt the flow of operations. We do not want us to happen to this company here. So it’s my job to identify these vulnerabilities and mitigate them before any malicious attacks.…

    • 534 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Security risk management

    • 45681 Words
    • 183 Pages

    Most organizations recognize the critical role that information technology (IT) plays in supporting their business objectives. But today's highly connected IT infrastructures exist in an environment that is increasingly hostile—attacks are being mounted with increasing frequency and are demanding ever shorter reaction times. Often, organizations are unable to react to new security threats before their business is impacted. Managing the security of their infrastructures—and the business value that those infrastructures deliver—has become a primary concern for IT departments.…

    • 45681 Words
    • 183 Pages
    Good Essays
  • Satisfactory Essays

    2. Vulnerability of a company’s network 3. How cyber security protects a company’s network c. Introduction of cyber-attacks that will be discussed.…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Senior UI designer

    • 2702 Words
    • 11 Pages

    CR415 Information Security Lecture.1 Introduction to Security Associate Professor Dr. : Essam Hamed Essam.hamed@aast.edu CR415 CLASS SCHEDULE…

    • 2702 Words
    • 11 Pages
    Powerful Essays