This website uses cookies to ensure you have the best experience. Learn more

Vulnerability Assessment Of The Company System And Recommendations On Measures To Mitigate Or Eliminate Potential Risks

1339 words - 6 pages


3.1 Identification of risks in the system and/or security vulnerabilities
Risks or security vulnerabilities identified in Dynamic company systems include:

3.1.1 Physical location of web servers is easily accessible by employees
The company has insufficient physical controls protecting equipment as the location of web servers are easily accessible by employees. According to Landoll (2011:312) humans pose a security risk to equipments. The controls over employees, visitors and outsiders should be put in place. Such controls include barriers used to limit access to physical premises and preventing unauthorized entry and removal.

3.1.2 Users are allowed to install their own software as needed
The company is exposed to Windows file system vulnerabilities as users are allowed to install their own software. The information that users create and Operating System (OS) files that are needed to boot the system are organised by the file system. The file system is therefore the most vital part of the operating system. Allowing users access the file system is as good as exposing it to risk (Simpson, Backman & Corley 2011: 205). Network security controls should be in place.

3.1.3 Running Ubuntu Server 7.1, Apache version 2.2.12, with a MySQL 3.23 back- end
Microsoft SQL Server is vulnerable to SQL injection attacks that can be used to attack the system. All versions before SQL Server 2005 could allow remote users to gain access to the System Administrator (SA) through the SA account on the server (Simpson, Backman & Corley 2011: 209). As the company is running its Server with MySQL 3.23, it is therefore exposed to the risk of allowing users to access the SA and perform malicious activities or the third party can access the SA through users and perform malicious.

3.1.4 No firewall installed
Lack of firewall exposes computers to risks such as fire that can attack hardware systems such as computers. Malware attacks pose a risk to computer software as viruses can be spread between computer softwares in the absence of firewalls (Ciampa 2010:91). Antivirus and other malware prevention tools must be used to prevent attacks.

3.1.5 The website was developed by the third party that is responsible for releasing security patches
Most third-party applications are vulnerable to known exploits that allow malicious attackers to access company website and launch spams, SQL injection. Attackers may get access to usernames. Application with known vulnerabilities open the company to targeted attacks (Carabott 2011).

3.2 Identification of measures/tools/methodologies to address risks and
Security vulnerabilities
Based on the identified risks or security vulnerabilities and the assessment tools that can be used to detect and stop them from attempting to crack computer systems, the following measures are necessary to make sure that company systems are protected from attacks:

3.2.1 Patching system
A security patch should be used to...

Find Another Essay On Vulnerability assessment of the company system and recommendations on measures to mitigate or eliminate potential risks

Operational Practices & Policy To Mitigate Risks On Multi-Purpose Ships & Maintain Port Equipment

3337 words - 14 pages industry operators cannot afford to take these risks, either deliberately or through lack of information. Therefore, a uniform ship vetting system must be in place to have an in-depth assessment of a ship's quality & suitability for a task, and past incident records. This is the best way to match available vessels to the operational requirements of the voyage & the type of products carried in a move to mitigate risks. The BLU Code, primarily

Vulnerability Assessment of Northern Ghana to Climate Variability

1653 words - 7 pages relationship with the three key dimensions, namely- exposure, sensitivity and adaptive capacity. Vulnerability relates to different degrees of exposure and sensitivity of a region or community to stress or stimuli such as climate variability, and also to the particular adaptive capacity of the region or communities to cope with the effects or risks associated with the exposures. Exposure and sensitivity are inherently linked and are dependent on

Role of Investment Banking and its potential risks to real economy

1679 words - 7 pages Part B: Role of Investment Banking and its potential risks to real economyIntroductionInvestment banking is another service besides commercial banking that plays an important role in the world of finance and globalization nowadays. It provides some services such as underwriting or advisory to help company increasing funds or dealing with merger and acquisition. This part will give an overview about investment banking sector as well as its main

Ways in Which the Nazis Tried to Eliminate all Jews in Europe from 1941 and On

1745 words - 7 pages Ways in Which the Nazis Tried to Eliminate all Jews in Europe from 1941 and On The Second World War began on the 1st September 1939: whilst Hitler had been strengthening his control within Germany, he had also been reinforcing Germany’s position within Europe. He had reclaimed parts of Germany in 1935; in 1938, he had annexed Austria, and part of Czechoslovakia ( which he totally invaded in 1939 ). World leaders

Recommendations on a suitable market to enter, justifying its choice based on that country's competitiveness, political stability, infrastructure, economic growth and its overall market potential

2682 words - 11 pages 1.0 INTRODUCTIONJPW Home Style is a company focused on providing tailor made furniture for approximately eighty percent (80%) of its customers. With the company's increase of sales by 40% over the last twelve months, has led to the suggestion that there is need to expand beyond the UK market.The choice of which market to enter has been driven by an assessment of the proposed country's relative long term growth and profit potential. With these

The Need to Eliminate the Abusive Treatment of Muslim Women

824 words - 3 pages The Need to Eliminate the Abusive Treatment of Muslim Women Thirty thousand men and boys poured into the dilapidated Olympic sports stadium in Kabul, capital of Afghanistan. Street hawkers peddle nuts, biscuits and tea to the waiting crowd. The scheduled entertainment? They were there to see a young woman, Sohaila, receive 100 lashes, and to watch two thieves have their hands chopped off. Sohaila had been arrested while walking with a man

The Potential Fix of a Flawed System

786 words - 4 pages system is flawed, and I will try to explain how it can be fixed. There are 538 electoral votes that are up for grabs during a presidential election. Many people don’t understand how these electoral votes are split up. First, you have to break down where these 538 votes come from. In Article 1, Section 3 of the United States Constitution it states that “ The Senate of the United States shall be composed of two Senators from each State, chosen by

China's Latent Economic Crisis and Potential Risks

5581 words - 22 pages financial dimensions of China's economy so as to reveal its real conditions.1. Potential Risks associated with a Latent Economic Crisis1*Ms. HE Qinglian is a visiting scholar at the University of Chicago. She left China unannounced in June 2001 in the face of widespread, government-sanctioned harassment of scholars. She is the author of two books: We Are Still Watching the Stars Above (2001) and China's Pitfalls (1998). Both document the dark side of

Risks and Potential Impact Relating to Security, Auditing and Disaster Recovery

600 words - 2 pages will be on file with the insurance company and at an offsite location. System backups are also secured at an offsite location. Additionally, approaches to the elimination and minimization of the risks are suggested.Risk rating is as follows: 5 - Very High Risk; 4 - High Risk; 3 - Medium Risk; 2 - Low Risk; 1 - Very Low RiskTABLE 1 - SECURITY RISK ASSESSMENTAssets &FunctionsWeightHuman ErrorViruses, WormsTheft of Property / InformationHackers

The vulnerability of computerised accounting information systems to computer crime

1916 words - 8 pages The vulnerability of computerised accounting information systems to computer crimeAbstractWith the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. CAIS has been used more and more broadly and had as much impact on organisations, however the computer crime is also an important issue related to CAIS. As the

The vulnerability of computerised accounting information systems to computer crime

1509 words - 6 pages process, financial fraud using computers, sabotage of data or networks, hard ware and software theft and so on (Power 2000).There are many motivations of those computer offenders to breach law. The main motivation is financial gain. Computerised Accounting Information system (CAIS) is to help control an organisation's financial resources, so it attracted to these computer criminals. Moreover, revenge is another motivations of criminal to access

Similar Essays

Vulnerability Assessment Of The Company System And Recommendations On Measures To Mitigate Or Eliminate Potential Risks

1214 words - 5 pages how they operate and the vulnerabilities or risks that they can address in the protection of passwords. Rouse (2006) refers to this step as the identification of potential threats to each resource. Run vulnerability scans Vulnerability scans can be run after understanding and mapping out company network infrastructure, applications, data flows and hardware, including security or protections needed . A security company that is well

Vulnerability Assessment Of The Company System And Recommendations On Measures To Mitigate Or Eliminate Potential Risks

1167 words - 5 pages scanning capabilities that include checking patches, windows checks, security updates, service packs, desktop application checks, configuration of errors (Simpson, Backman & Corley 2011: 211). MBSA can be used to perform vulnerability assessment in the company because all computers on the internal network are running Windows XP Professional (32 bit), Microsoft Office 2000, Adobe Reader, Java and other applications. The Web company Web server is

Environmental Impact Assessment And Mitigation Measures On The Chilterns Aonb

2197 words - 9 pages they could also affect chalk streams because the tunnel would be in contact with groundwater and consequently, it can damage the aquifer and pollute the water (chilternsociety, 2011). In order to mitigate the impact on wildlife, construction of “green bridges” or wildlife underpasses could be effective measures. However, these constructions are expensive and they have to be designed for the species of concern. Other options are fences and

Assessment Of Households’ Vulnerability To Food Insecurity And Determinant Factors In Developning Countries: The Case Of Ethiopia

1612 words - 7 pages potentially large share of the population that is likely to change its food security status in the near future. These include currently food secure households that may become food insecure in the near future and, on the other hand, households that are likely to overcome a currently food insecure situation without external assistance. Thus, forward‐looking analysis of vulnerability to food insecurity allows correcting these potential errors in