Security Vulnerabilities
Student’s Details
University Affiliation
Date of Submission
Security vulnerabilities
Vulnerability testing identifies potential threats and security weaknesses in a company’s network and system. Cybersecurity threats have increasingly risen over the past years as technological advancements peaks. In organizations, employees use emails and the internet regularly, which paves a risk of a cyber-breach. Thus, organizations must identify vulnerability in their systems and networks to ensure they are operating safely and securely. The safety of data and networks is essential in ensuring continued business operation and protecting business reputation. Cybercriminals continue to use sophisticated tools to gain access to organization systems leading to increased security issues. However, testing for vulnerability on system networks reduces this security challenge by identifying weak exploitable points before hackers exploit the system flaws. In identifying these vulnerabilities, it is vital to consider asking the right question for more accessible and broader perspectives of defining the system flaws.
The question of whether the organization regularly maintains its network is among the crucial questions to ask. This is regarding upholding cybersecurity precautions like updating network defense layers, regular updates to hardware and software, and compliance to internal and external policies and regulations. Secondly is the question of whether the organization stays informed on the latest cyber threats. Attackers are always using new approaches to attack systems; organizations must be well-versed in these techniques. Through this, they can identify the weak points that are vulnerable to these cyber threats.
Thirdly is whether the organization provides regular training to employees on cyber hygiene. Employees are the individual who frequently interacts with the computer posing a considerable risk to a data breach in case they lack knowledge on security precautions when using the internet. Finally is how often the organization reviews its audit log. This will determine the vulnerabilities that exist in access control measures in place.
References
Alam, D., Kabir, M. A., Bhuiyan, T., & Farah, T. (2015, October). A Case Study Of Sql Injection Vulnerabilities Assessment Of. Bd Domain Web Applications. In 2015 Fourth International Conference On Cyber Security, Cyber Warfare, And Digital Forensic (Cybersec) (Pp. 73-77). IEEE.
Smith, J., Johnson, B., Murphy-Hill, E., Chu, B., & Lipford, H. R. (2015, August). Questions Developers Ask While Diagnosing Potential Security Vulnerabilities With Static Analysis. In Proceedings Of The 2015 10th Joint Meeting On Foundations Of Software Engineering (Pp. 248-259).