Cyber Security Vulnerabilities : Information Systems And Network

1614 WordsOct 19, 20157 Pages
Cyber Security Vulnerabilities Abstract There are several cyber security vulnerabilities that organizations and individuals need to consider to protect the integrity and confidentiality of their computer systems and networks. These vulnerabilities include software and hardware, intranet, enterprise network, wide and local area network, and transmission media. This paper, therefore, focuses on software and hardware vulnerabilities as the most important and the reasons it is the most important. The paper further focuses on the risks associated with these vulnerabilities (software and hardware) and provides the recommendations on ways to manage the risks. Introduction Many organizations are struggling every day to protect the availability,…show more content…
The hardware is susceptible to such threats as dust, soiling, humidity, rusting, and unprotected storage. Dust, humidity, soiling, and rusting can cause the physical components of a computer and other devices to crash and cease functioning, which can lead to loss of information. Additionally, unprotected storage can lead to unauthorized access to the computer system, which may cause a breach or even loss of the stored information. Software vulnerability refers to the errors or weaknesses that the cyber security attackers can subjugate to alter the normal functioning or behavior of a computer system. Most systems are used in multiple environments and by different users, therefore, any individual with malicious intentions can take advantage of that to launch attacks that can compromise the system leading to unpredictable damage and costs to the organization. There are some software vulnerabilities but the most common are; buffer overflow, cross site scripting, and SQL injection (Khan, 2012). A buffer overflow occurs when the written data present on the storage software surpasses a given capacity of the software component. The corruption of the new additional data may lead to malfunctioning of the system by allowing unauthorized individuals to inject malicious codes into the computer system. Cross-site scripting involves injection of codes into the web pages that are accessed by other computer users. A malicious attacker can access existing system controls through such
Open Document