User Vulnerability in Cybesecurity

1790 Words4 Pages

Introduction

It should not be a surprise that the biggest vulnerability in Cybersecurity is the user (Goldman, 2010). The vulnerabilities presented by the user fall into two general categories: (1) accidental and (2) malicious. Vulnerabilities are important to those that are trying to perform unauthorized actions on an information system. For this paper, the term information system is being used generically to be anything from a home computer to a global enterprise encompassing numerous servers and storage systems. These unauthorized actions are threats to the information system. While not all vulnerabilities create threats, even a single vulnerability puts the information system at risk.

Most threats that an information system faces depend on or benefit when user vulnerabilities are present (Verizon RISK Team & United States Secret Service, 2010). Additionally, the potential for damage can be more significant when exploits include user vulnerabilities, as it can have direct impact on the effectiveness of countermeasures (CERT, 2010). When a threat is executed by an attacker (e.g. hacking, social engineering), it creates an incident that affects the organization, potentially in many ways. These incidents have operation and financial costs to the organization.

It is possible to address the vulnerabilities and thus make reduce the risk that threats present. On one side, increases are necessary in training and awareness both in intensity and frequency within enterprises along with better countermeasures. On the other side, end-user training and awareness needs to be elevated in society with public campaigns for every age group. Let us take a deeper look at what are vulnerabilities induced by the user.

User Indu...

... middle of paper ...

... Retrieved February 24, 2011, from Department of Homeland Security: http://www.dhs.gov/xlibrary/assets/niac/niac_insider_threat_to_critical_infrastructures_study.pdf

Pfleeger, C. P., & Pfleeger, S. L. (2007). Security in Computing (4th ed.). Upper Saddle River, NJ: Prentice Hall.

SANS Institute. (2009, September). The Top Cyber Security Risks. Retrieved February 22, 2011, from SANS Institute: http://www.sans.org/top-cyber-security-risks/?ref=top20

Vacca, J. R. (2009). Computer and Information Security. Burlington, MA: Morgan Kaufmann.

Valacich, J., & Schneider, C. (2010). Information Systems Today. Upper Saddle River: Prentice Hall.

Verizon RISK Team, United States Secret Service. (2010). 2010 Data Breach Investigations Report. Retrieved February 24, 2011, from United States Secret Service: http://www.secretservice.gov/MC14510_2010%20DBIR%20layout_US_online.pdf

More about User Vulnerability in Cybesecurity

Open Document