Cyber Vulnerabilities

1337 Words3 Pages

INTRODUCTION

With cyber-attacks on the continuous rise, organizations public and private must address computer security vulnerabilities. SANS Institute has revealed “unpatched client-side software applications” as the top priority vulnerability for organizations globally. In conjunction with unpatched client software, vulnerable “Internet-facing web sites” can result in an organizations infrastructure to be compromised. In this study I will address the issue of unpatched client software, the impact to an organizations infrastructure, and patch management as a vital mitigation solution. (http://www.sans.org)

BODY

CLIENT SIDE “UNPATCHED” SOFTWARE APPLICATIONS VULNERABILITIES

Newly released software inevitably has glitches or “bugs”. Over time, software programmers will address detected with a patch. A patch is a piece of programming that “fixes” the glitch in software applications. Most patches are downloadable over the Internet via a manufacturer’s website. They are also incorporated in upgrades and updates. Computer software programs will always have flaws “bugs” that must be continuously secured (patched) to ensure proper functionality. A client workstation with unpatched software can promote the propagation of malicious software. Web browsers, office software, and email are the weapons used to exploit unpatched client-side vulnerabilities.

Web browser plug-ins is a double edge sword with regard to vulnerable unpatched client workstations and malicious attacks to gain access to an organization system. Plugins typically support client side web scripting language. They are staples in a web browser, used to view files and multimedia. Unpatched plugin not updated can potentially allow hackers to install malicious viruses on a u...

... middle of paper ...

...trols for Effective Cyber Defense: Consensus Audit Guidelines

http://csis.org/files/publication/Twenty_Critical_Controls_for_Effective_Cyber_Defense_CAG.pdf

National Institute of Standards and Technology, Technical Administration of US Dept. of Commerce

Creating a Patch and Vulnerability Program

http://csrc.nist.gov/publications/nistpubs/800-40-Ver2/SP800-40v2.pdf

PRIORITIZING CYBER VULNERABILITIES FINAL REPORT AND RECOMMENDATIONS, BY THE COUNCIL

http://www.dhs.gov/xlibrary/assets/niac/NIAC_CyberVulnerabilitiesPaper_Feb05.pdf

DOD Strategy for Operating in Cyber Space

http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf

nytimes Sony data breach

http://www.nytimes.com/2011/04/27/technology/27playstation.html?_r=1&scp=6&sq=sony%20data%20breach&st=cse

Data breach

http://energycommerce.house.gov/hearings/hearingdetail.aspx?NewsID=8534

More about Cyber Vulnerabilities

Open Document