This website uses cookies to ensure you have the best experience. Learn more

Vulnerability Assessment Of The Company System And Recommendations On Measures To Mitigate Or Eliminate Potential Risks

1214 words - 5 pages

2.2 Performing vulnerability assessments
Vulnerability assessments are conducted to secure computer networks from attacks. Administrators usually consider patching and deploying antivirus. Vulnerability assessments should be set to run constantly to alert the administrator of any change that may be detected on the network to ensure network security protection (Carabott 2011). Performing a successful vulnerability assessment for the company requires support from administration, a formal methodology and assessment tools (Perry nd).

2.2.1 Vulnerability assessment steps
In performing vulnerability assessment, the following steps will be considered: Identify and understand your business
The first step in vulnerability assessment is the identification and understanding of business processes in the company. The most critical and sensitive business processes such as compliance, customer privacy, competitive position, etc. must be identified by representatives from different sections of the company such as Information Technology (IT), business units, finance and legal section (Orde & Poarch 2012). Pinpoint the applications and data that underlie business processes
After identifying the most critical and sensitive business processes, applications and data that underlie business processes must be identified (Orde & Poarch 2012). Applications and data that underlie business processes at the Insurance company includes Windows XP, Microsoft Office 2000, Adobe Reader, Java, SSL, MD5, RSA, Google Drive, Base64 string and Ubuntu Web server with MySQL 3.23 back end. Rouse (2006) refers to this step as the defining and classifying network or system resources. Find hidden data sources
Hidden data sources should be identified and those include mobile devices such as Smartphones, tablets and desktop PCs. It is necessary to understand data flows between mobile devices, data center applications and storage. Users of mobile devices who access and share corporate applications and data must also be identified in order to understand the available data sources (Orde & Poarch 2012). Data sources such as Google Drive must also be identified as a file sharing system. Determine what hardware underlies applications and data
Layers of company infrastructure must be known in order to identify the physical and virtual servers running critical applications. Data storage devices must also be identified as they are vulnerable to attacks (Orde & Poarch 2012). Applications such as Ubuntu Server 7.1, Apache version 2.2.12 that is running on company systems must be known. Rouse (2006) refers to this step as assigning relative levels of importance to the resources. Map the network infrastructure that connects the hardware
Routers and other network devices that the applications and hardware infrastructure depend on for faster and secure performance must be identified (Orde & Poarch 2012). Since users at Dynamics Insurance company are allowed...

Find Another Essay On Vulnerability assessment of the company system and recommendations on measures to mitigate or eliminate potential risks

Operational Practices & Policy To Mitigate Risks On Multi-Purpose Ships & Maintain Port Equipment

3337 words - 14 pages industry operators cannot afford to take these risks, either deliberately or through lack of information. Therefore, a uniform ship vetting system must be in place to have an in-depth assessment of a ship's quality & suitability for a task, and past incident records. This is the best way to match available vessels to the operational requirements of the voyage & the type of products carried in a move to mitigate risks. The BLU Code, primarily

Vulnerability Assessment of Northern Ghana to Climate Variability

1653 words - 7 pages relationship with the three key dimensions, namely- exposure, sensitivity and adaptive capacity. Vulnerability relates to different degrees of exposure and sensitivity of a region or community to stress or stimuli such as climate variability, and also to the particular adaptive capacity of the region or communities to cope with the effects or risks associated with the exposures. Exposure and sensitivity are inherently linked and are dependent on

Role of Investment Banking and its potential risks to real economy

1679 words - 7 pages Part B: Role of Investment Banking and its potential risks to real economyIntroductionInvestment banking is another service besides commercial banking that plays an important role in the world of finance and globalization nowadays. It provides some services such as underwriting or advisory to help company increasing funds or dealing with merger and acquisition. This part will give an overview about investment banking sector as well as its main

Ways in Which the Nazis Tried to Eliminate all Jews in Europe from 1941 and On

1745 words - 7 pages Ways in Which the Nazis Tried to Eliminate all Jews in Europe from 1941 and On The Second World War began on the 1st September 1939: whilst Hitler had been strengthening his control within Germany, he had also been reinforcing Germany’s position within Europe. He had reclaimed parts of Germany in 1935; in 1938, he had annexed Austria, and part of Czechoslovakia ( which he totally invaded in 1939 ). World leaders

Recommendations on a suitable market to enter, justifying its choice based on that country's competitiveness, political stability, infrastructure, economic growth and its overall market potential

2682 words - 11 pages 1.0 INTRODUCTIONJPW Home Style is a company focused on providing tailor made furniture for approximately eighty percent (80%) of its customers. With the company's increase of sales by 40% over the last twelve months, has led to the suggestion that there is need to expand beyond the UK market.The choice of which market to enter has been driven by an assessment of the proposed country's relative long term growth and profit potential. With these

The Need to Eliminate the Abusive Treatment of Muslim Women

824 words - 3 pages The Need to Eliminate the Abusive Treatment of Muslim Women Thirty thousand men and boys poured into the dilapidated Olympic sports stadium in Kabul, capital of Afghanistan. Street hawkers peddle nuts, biscuits and tea to the waiting crowd. The scheduled entertainment? They were there to see a young woman, Sohaila, receive 100 lashes, and to watch two thieves have their hands chopped off. Sohaila had been arrested while walking with a man

The Potential Fix of a Flawed System

786 words - 4 pages system is flawed, and I will try to explain how it can be fixed. There are 538 electoral votes that are up for grabs during a presidential election. Many people don’t understand how these electoral votes are split up. First, you have to break down where these 538 votes come from. In Article 1, Section 3 of the United States Constitution it states that “ The Senate of the United States shall be composed of two Senators from each State, chosen by

China's Latent Economic Crisis and Potential Risks

5581 words - 22 pages financial dimensions of China's economy so as to reveal its real conditions.1. Potential Risks associated with a Latent Economic Crisis1*Ms. HE Qinglian is a visiting scholar at the University of Chicago. She left China unannounced in June 2001 in the face of widespread, government-sanctioned harassment of scholars. She is the author of two books: We Are Still Watching the Stars Above (2001) and China's Pitfalls (1998). Both document the dark side of

Risks and Potential Impact Relating to Security, Auditing and Disaster Recovery

600 words - 2 pages will be on file with the insurance company and at an offsite location. System backups are also secured at an offsite location. Additionally, approaches to the elimination and minimization of the risks are suggested.Risk rating is as follows: 5 - Very High Risk; 4 - High Risk; 3 - Medium Risk; 2 - Low Risk; 1 - Very Low RiskTABLE 1 - SECURITY RISK ASSESSMENTAssets &FunctionsWeightHuman ErrorViruses, WormsTheft of Property / InformationHackers

The vulnerability of computerised accounting information systems to computer crime

1916 words - 8 pages The vulnerability of computerised accounting information systems to computer crimeAbstractWith the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. CAIS has been used more and more broadly and had as much impact on organisations, however the computer crime is also an important issue related to CAIS. As the

The vulnerability of computerised accounting information systems to computer crime

1509 words - 6 pages process, financial fraud using computers, sabotage of data or networks, hard ware and software theft and so on (Power 2000).There are many motivations of those computer offenders to breach law. The main motivation is financial gain. Computerised Accounting Information system (CAIS) is to help control an organisation's financial resources, so it attracted to these computer criminals. Moreover, revenge is another motivations of criminal to access

Similar Essays

Vulnerability Assessment Of The Company System And Recommendations On Measures To Mitigate Or Eliminate Potential Risks

1339 words - 6 pages risks or security vulnerabilities and the assessment tools that can be used to detect and stop them from attempting to crack computer systems, the following measures are necessary to make sure that company systems are protected from attacks: 3.2.1 Patching system A security patch should be used to update the company systems in order to protect them from attacks. A security patch is defined as a software security update intended to cover

Vulnerability Assessment Of The Company System And Recommendations On Measures To Mitigate Or Eliminate Potential Risks

1167 words - 5 pages scanning capabilities that include checking patches, windows checks, security updates, service packs, desktop application checks, configuration of errors (Simpson, Backman & Corley 2011: 211). MBSA can be used to perform vulnerability assessment in the company because all computers on the internal network are running Windows XP Professional (32 bit), Microsoft Office 2000, Adobe Reader, Java and other applications. The Web company Web server is

Environmental Impact Assessment And Mitigation Measures On The Chilterns Aonb

2197 words - 9 pages they could also affect chalk streams because the tunnel would be in contact with groundwater and consequently, it can damage the aquifer and pollute the water (chilternsociety, 2011). In order to mitigate the impact on wildlife, construction of “green bridges” or wildlife underpasses could be effective measures. However, these constructions are expensive and they have to be designed for the species of concern. Other options are fences and

Assessment Of Households’ Vulnerability To Food Insecurity And Determinant Factors In Developning Countries: The Case Of Ethiopia

1612 words - 7 pages potentially large share of the population that is likely to change its food security status in the near future. These include currently food secure households that may become food insecure in the near future and, on the other hand, households that are likely to overcome a currently food insecure situation without external assistance. Thus, forward‐looking analysis of vulnerability to food insecurity allows correcting these potential errors in