The Vulnerability Of Computer Security Essay

The Vulnerability Of Computer Security Essay

Length: 716 words (2 double-spaced pages)

Rating: Better Essays

Open Document

Essay Preview

In computer security, a vulnerability is a weakness which allows an attacker to reduce a system 's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface. (Wikipedia).
With this previous definition we can assume that a threat occurs when a weakness is Identified and attacked from an outside source for malicious purposes. By doing things like threat assessments we can tell the best course of action to take before the problem gets too far out of hand. There is no such thing as a common threat; everyone and anything can be a threat, from former employees, to current disgruntled ones. The same goes for viruses and malware, they are always evolving and becoming stronger this making it harder and harder to combat and detect.
Common ways of preventing things like this is by having a knowledgeable CSIRT also known as (Computer Security Incident Response Team). A Computer Security Incident Response Team (CSIRT, pronounced "see-sirt") is an organization that receives reports of security breaches, conducts analyses of the reports and responds to the senders. A CSIRT may be an established group or an ad hoc assembly (Cyber Threat Source Descriptions).
FLAME- “Also known as Skywiper and Flamer, Flame is a modular computer malware that was discovered in 2012 as a virus used to attacks computer systems in Middle Eastern countries that run on Microsoft Windows as their operating system. Used by hackers for espionage purposes, i...


... middle of paper ...


...by Anonymous, a leaderless group of internet-based hacktivist that originated from 4chan. The Project Chanology originated from the church’s attempt to remove the material from the highly-publicized interview of Tom Cruise, a prominent member of the church, in the internet in January 2008. It started with a YouTube “Message to Scientology” on January 21, 2008 and was followed by distributed denial of service attacks (DDoS), prank calls, black faxes and other methods due to their views of internet censorship implemented by Scientology (list25)”.
These are just a few of the major attacks that have happened over the prior years, as you can see having a good CSIRT is almost one of the most important things a company or organization can have. Without the proper security personal in place the average company is at risk for many attacks and potential data/information theft.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

The C & A Process Essay

- Final Exam Essay 3 The C&A process should be relatively easy to understand, be consistent in its application, and be applied continuously in its implementation. First, certification is the comprehensive assessment of the technical and nontechnical security features and other safeguards of a system that are associated with its use to establish the extent to which an information system meets a set of minimum security requirements. The Certification Phase of the C&A process includes a system analysis to identify weaknesses in the operation of the system, as well as an analysis of the potential vulnerabilities of these weaknesses....   [tags: Risk, Security, Computer security, Vulnerability]

Better Essays
994 words (2.8 pages)

The Internet Of Things Is An Expanding System Of Everyday Objects Essay example

- The Internet of Things is an expanding system of everyday objects that are embedded with technology, allowing them to connect, communicate and transfer information about users and their surroundings to each other. How the Internet of Things devices are increasing drastically day by day, risks and threats in the system also increasing. Risks may happen due to many reasons like vulnerabilities in software using in the system, security. Importance of checking the risks is to eliminate or reduce the loss with the risk....   [tags: Computer security, Security, Risk, Vulnerability]

Better Essays
1503 words (4.3 pages)

Essay on The Vulnerability Of A Computer Hardware

- I can start with a quote about people What is Vulnerability. When you think of the word vulnerability what comes to mind. Although, definitions of Vulnerability may vary, Hoffmaster defines the term as not contemporary morality but simply to be impressionable to all things considered to be a weakness. In the cyberworld vulnerability can be defined as weakness in a computer hardware or software that can be exploited. Most would considered vulnerability as a threat is the approach in which a vulnerability can be exploited....   [tags: Security, Computer security, Information security]

Better Essays
1403 words (4 pages)

Human Vulnerability and IT Security Essay

- Information Technology (IT) managers are constantly tasked with evaluating their organization’s overall security posture and reporting the greatest vulnerabilities to leadership. Senior management is often surprised to hear that the greatest vulnerability within an organization is not a misconfigured firewall or a virus being forwarded across an internal e-mail server, but rather a human being. When compared to a piece of hardware or software, a human user is easily the single most targeted weakness within an organization....   [tags: Computer and Information Security]

Better Essays
2352 words (6.7 pages)

Identifying Vulnerability And Risk Vectors For Internet Of Things Essay

- Introduction The purpose of this quantitative research study is to find a solution for identifying vulnerability and risk vectors for Internet of Things (IoT) and sensitive data processed and stored across billions of devices or things connected to Internet for enabling private and public transactions. Information Security vulnerabilities can be addressed by identifying threats from vulnerabilities, gaps in existing physical, technical controls and processes proactively and implementing the required mitigation controls....   [tags: Computer security, Security, Risk]

Better Essays
1229 words (3.5 pages)

Essay about Cyber Security Field Of The Computer Science

- To: Incoming Computer Science Students From: Christopher Beberness Subject: Vulnerability Assessment Analysis Date: October 8, 2016 Purpose The vulnerability assessment is used in the cyber security field of the computer science. The purpose of this report template is to effectively convey information conducted from a penetration test on a company’s network. Background The vulnerability assessment report is comprised of any exploit or possible weaknesses found in a company’s network while conducting a penetration test as well as a level of risk and how it can be addressed [2]....   [tags: Computer security, Computer, Security]

Better Essays
1049 words (3 pages)

Annotated Bibliography On Computer Security Essay

- “In HYPERLINK "https://en.wikipedia.org/wiki/Computer_security" computer security, a vulnerability is a weakness which allows an HYPERLINK "https://en.wikipedia.org/wiki/Hacker_(computer_security)" attacker to reduce a system 's HYPERLINK "https://en.wikipedia.org/wiki/Information_assurance" information assurance”. In other words some entity you may or may not have done direct business with has a flaw in their data flow or storage that allows an attacker access and the ability to move forward a secure level without invitation or permission....   [tags: Computer security, Internet, Attack]

Better Essays
843 words (2.4 pages)

Essay about Impact of Cyber Security Vulnerability on Organizations

- Weaknesses to mistreatment in contemporarymainframes are wide-ranging. They variant from weaknesses of internet server which permitthe hackers or assailantsto command the internet server to a cultured lateral network that uses stuff like packet technique or immediate control depletion to collect private and trustworthy material from cyber security computersystems. Vulnerabilities or weaknesses seem to be in the customer software whois a fellow of an industry that uses it to get their tasks performed....   [tags: hackers, cyber security, softwares]

Better Essays
1270 words (3.6 pages)

Computer Misuse Act Of The Uk Essay

- Computer misuse Act It is an act of the parliament of the UK redacted in 1990 as a measure to cope to the new technological threats. Old traditional forms of crime such as harassment and fraud offences are being committed electronically via computers or internet nowadays. Lately are appearing new forms of e-crime using new technologies such as Denial of Service ( DOS ) attack and phishing by offenders with good technical knowledge in IT.Thus laws in our society needs to be updated to deal to the new forms of crime....   [tags: Computer security, Security, Information security]

Better Essays
1226 words (3.5 pages)

Vulnerability Scanning Essay

- This paper is being furnished to provide the CIO with a technology evaluation of vulnerability scanning. The information provided will ensure that the CIO has the required information to make the best decision in regards to this technology. This paper provides a brief understanding of vulnerability scanning, its many forms, the types of scanners available, the advantages and disadvantages, and the costs involved. Introduction Vulnerability scanning is an automated process that is conducted by an organization’s IT staff to identify any vulnerability that their information systems might possess and used to help “secure your own network” (Bradley)....   [tags: Technology Evaluation]

Better Essays
1282 words (3.7 pages)