Sunday, December 22, 2019

Cyber Vulnerabilities - 1352 Words

INTRODUCTION With cyber-attacks on the continuous rise, organizations public and private must address computer security vulnerabilities. SANS Institute has revealed â€Å"unpatched client-side software applications† as the top priority vulnerability for organizations globally. In conjunction with unpatched client software, vulnerable â€Å"Internet-facing web sites† can result in an organizations infrastructure to be compromised. In this study I will address the issue of unpatched client software, the impact to an organizations infrastructure, and patch management as a vital mitigation solution. (http://www.sans.org) BODY CLIENT SIDE â€Å"UNPATCHED† SOFTWARE APPLICATIONS VULNERABILITIES Newly released software inevitably has glitches or â€Å"bugs†.†¦show more content†¦Email is a trending tool to exploit client side vulnerabilities. Email is a tool for spear phishing. Spear phishing exploits client-side vulnerabilities by using deceptive impersonations of applications. The email may contain a link to a trusted website, where the victim discloses personal information. Typically, the ultimate goal of the attacker is to steal data from the targeted organization and also to install back doors access so attacker can return for further exploitation. Do not open any junk mail, open email messages in plain text preferably HTML or RTF, lower administrative rights while access web browsers and no opening attachment until properly scanned (www.sans.org) Office solutions software applications are used as an exploit tool for spear phishing attacks using email. When a user opens the malicious document the exploits vulnerabilities in the office software begin. An attacker hosts a malicious document on a web server or shared folder, and entices a user to browse to the web page or the shared folder. Note that, in most situations, Internet Explorer automatically opens Microsoft Office documents. Hence, browsing the malicious web page or folder is sufficient for vulnerability exploitation in many cases (www.sans.org) Navigating vulnerable unpatched client-side workstations through the Internet super highway can lead to computer securityShow MoreRelatedcyber security vulnerabilities4737 Words   |  19 Pagesï » ¿ Cybersecurity Vulnerabilities Facing IT Managers Today Darin Swan University of Maryland University College Two factors increase the stakes of the cyber struggle. Tactically and operationally, the increasing dependence of modern technologically advanced forces (especially U.S. forces) on networks and information systems create new kinds of exploitable vulnerabilities. Second, as modern societies including the militaries that mirror them have continued to evolve, they have become everRead MoreThe Vulnerabilities And Cyber Kill Chain1243 Words   |  5 PagesA. ICS Vulnerabilities and Cyber Kill Chain 1. Reconnaissance - Summarize plausible active gathering, passive gathering, and active reconnaissance techniques that the adversary could have executed to gain intelligence on the target in the scenario. Reconnaissance is the act of collecting background research necessary to identify and select targets. (1) Cyber reconnaissance is an important stage of a well-organized cyber-attack, and is also one of the most time-consuming activities. This phase canRead MoreCyber Security And Vulnerability And Immigration1447 Words   |  6 PagesIntroduction Cyber security/vulnerability and immigration are some of the aspects that have raised concern in the recent past and significantly affect the ability of organizations in meeting their set objectives and goals. The current global setting has made our global economy highly sensitive to information as any form of security failing that may result in a long-term expense to the business. The situation will negatively affect consumer trust as well as spoil the overall reputation of the organizationalRead MoreCyber Security Vulnerability : A Analysis On The Vulnerabilities As Well As The Uses Of Cyber Intrusions2396 Words   |  10 Pages Cyber security vulnerability Bryan States University of Maryland University College Professor CSEC 610 July 7, 2015 Introduction An analysis on the vulnerabilities as well as the use of cyber intrusions in an organizational network has become key for running businesses (Sengupta, Mazumdar Bagchi, 2011). Enterprises including academic facilities, government parastatals and manufacturing firms are started to carry out business. The organizations mentioned above will in one way orRead MoreNetwork Vulnerabilities And Cyber Kill Chain Essay1277 Words   |  6 PagesA- ICS Vulnerabilities and cyber kill chain 1. Reconnaissance This is the phase of the cyber operation in which the cyberwarriors gather information about potentials targets. This operation can be subdivided in three sub phases. The war planners provides objectives, targeters search for potential target that might achieve the war objectives, intelligence professionals gather information about the target’s weaknesses that might be exploited in an attack (Chapple Seidl, 2015, p. 5.2). Passive ReconnaissanceRead MoreThe Cyber Security Vulnerabilities Faced By Different Networks913 Words   |  4 PagesIn today society, Information Technology (IT) managers are facing their fears of different cyber security vulnerabilities faced by different network. The vulnerabilities being either unknown or known makes it challenging for an Information Technology manager to keep the network secure. Organizations prefer to deal with wireless network because of what it can offer. According to Cisco, wireless networks are a powerful tool for boosting productivity and encouraging information sharing. With untetheredRead MoreEssay Impact of Cyber Security Vulnerability on Organizations1263 Words   |  6 Pagesnetwork that uses stuff like packet technique or immediate control depletion to collect private and trustworthy material from cyber security computersystems. Vulnerabilities or weaknesses seem to be in the customer software whois a fellow of an industry that uses it to get the ir tasks performed. The uncovered customer software side is the most important cybersecurity vulnerability/ weakness that the IT community is facing nowadays. Since all the new industries (companies, non-profits or government entities)Read MoreThreat Assessment Ranks Cyber Related Vulnerabilities1508 Words   |  7 PagesThe 2014 Worldwide Threat Assessment ranks cyber-related vulnerabilities as the number one homeland security threat against the United States. In addition to cyber threats within the nation, Russia and China continue to hold views substantially divergent from the United States on the meaning and intent of international cyber security. Also stated within the 2013 Worldwide Threat Assessment is North Korea as they are becoming a tier one threat to the United States. Supervisory Control and Data AcquisitionRead MoreCyber Security Vulnerabilities : Information Systems And Network1614 Words   |  7 PagesCyber Security Vulnerabilities Abstract There are several cyber security vulnerabilities that organizations and individuals need to consider to protect the integrity and confidentiality of their computer systems and networks. These vulnerabilities include software and hardware, intranet, enterprise network, wide and local area network, and transmission media. This paper, therefore, focuses on software and hardware vulnerabilities as the most important and the reasons it is the most important. TheRead MoreAs Organizations Reliance On Technology Continues To Grow974 Words   |  4 Pages As organizations reliance on technology continues to grow so has the amount of cyber attacks which occur compromising organizations information systems and networks. These cyber attacks can have drastic effect on organization financially including downtime or even regulatory fines. Due to this the need to be able to properly identify assets, their vulnerabilities and threats, and the risk they pose to the organization has become a must for ensuring the protection of organizations information systems

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.