Vulnerability Of IT Infrastructures: Internal And External Threats

Superior Essays
Vulnerability of IT Infrastructures: Internal and External Threats
Sylvester Ngoma
Ph.D. Candidate
Information Technology Educator
March 04, 2012
Vulnerability of IT Infrastructures
1
Introduction
The pervasive and complex nature of security threats to Information Technology (IT) continues to be a major concern for modern organizations and businesses. IT infrastructures, which have become the cornerstone of organizational management, are highly vulnerable to potential attacks and sabotage. IT vulnerabilities may be attributable to internal and external sources (McNamara, 1998; Yeh and Chang, 2007). As Colwill (2010) notes, these sources can be intentional or accidental.
IT threats are multilayered. They involve a number of components including
…show more content…
Vulnerability Analysis of IT Infrastructure
Vulnerability as a concept and as a process has been defined as a weakness that can be exploited to gain access to data (Liu and Cheng, 2009). Vulnerability refers to a deficiency or a security hole. There is a general consensus that computer systems and networks are inherently imbued with a number of weaknesses that may compromise their security. Weaknesses take various forms: architectural, procedural, and structural. Programming errors, network errors, operation errors, compatibility errors, and configuration errors are some examples of vulnerabilities. It is supremely useful to identify sources of the vulnerabilities. Ramarkrishnan and Sekar (2002) argue that vulnerabilities stem from interactions among several system components such as operating system, file system, sever processor, and content.
There is ample evidence that IT systems are facing serious security challenges. The nature of the threat has evolved, and with it, the sources, the perpetrators, the intent, and the consequence (Yeh and Chang, 2007). From the fear of forced access to physical entities
…show more content…
Without the intervention of the Federal Bureau of Investigation (FBI), this transaction would have gone through. Because of the financial impact and the severity of the damage these acts may cause, the United States Congress approved the Economic Espionage Act of 1996 to deter both espionage and other IT sabotage acts. Although there has been a
Vulnerability of IT Infrastructures
8
significant decrease in the annual cost of information theft fraud from $56 billion in 2002 to $37 billion in 2010, according to the 2011 Javelin Strategy & Research Report, much work still needs to be done to secure IT infrastructures in the United States. McNamara (1998) points out that the annual loss in 1998 was only $136 million, according to a CSI/FBI Computer Crime Survey.
Peer-to-Peer Applications
By default, open peer-to-peer (P2P) networks are vulnerable to security threats (Vlachos,
Androutsellis-Theotokis, and Spinellis, 2004). P2P applications including VOIP, instant messaging, videoconferencing sharing, and open source file sharing (Waklawsky, 2006) are another source of IT security threat in an organization. Architecturally, P2P networks are vulnerable to attacks. Through file-sharing, networks may be exposed to malicious

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In its fiscal year 2016 assessment report, ICS-CERT listed the most prevalent critical infrastructure vulnerabilities and potential risk that may result from exploitation of these weaknesses. 1. Boundary protection: Weaker boundaries between industrial control systems and enterprise networks makes it difficult to detect unauthorized activity in critical systems. 2. Least functionality: It is important for organizations to minimize and close unused services, ports, protocols, applications and functions that increases vectors for malicious party to gain access to critical systems.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    Security systems both physical and virtual are utilized to safeguard information from being copied, stolen, or destroyed. This is complicated by the fact that cyber-attacks can originate from hundreds of miles away and the source can be complicated to determine (Kemp 2012, p. 33). This leads to more robust security systems and multiple layers of duplicated…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Two Vulnerabilities

    • 1130 Words
    • 5 Pages

    This report is a discussion and analysis of two different vulnerabilities that have been discovered in the last two years. The two vulnerabilities discussed in this report are weakness in the Windows Telnet Services and the flaw in Internet Explorer 8. Both the vulnerabilities are discussed in detail and such that it mentions what the vulnerability affects, how it can be identified, why it is significant and interesting, how an attacker may exploit the vulnerability and any available patches or updates that fix the vulnerability. The two vulnerabilities that will be discussed in this report are weaknesses in the Microsoft’s Terminal Services or Terminal Server and zero day vulnerability in Internet Explorer 8.…

    • 1130 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The attack had little impact on internet use but the social aspect of the event caused trepidation in surfing or opening emails from fear of infection. • Perpetrator: The malicious attack is attributed to Shadow brokers. This organization operates in secrecy and is attributed for utilizing obtained information for exposing government agencies covert operations against its populace. • Attack scenario: See above • Risk…

    • 749 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    To thwart any attack, the security apparatus must be ready to deal with security challenges as they arise. Organizations usually miss this important point and lack effective coordination when there is a security breach. To mitigate any security breaches or attacks from within the organization, organizations could implement procedures such as maintaining an effective access control mechanism, encrypting sensitive information and implementing an authorized-only-device policy in the organization. Organizations could also carry out disaster recovery drills to understand the weaknesses in the security apparatus and identify the best course of actions in case of emergencies. The plans should be detailed enough to provide a comprehensive defense against an attack.…

    • 810 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    As a large Fortune 500 company, it is extremely important that all measures against threats are managed properly. With the advancement in Information Technology, there are ways to manage security vulnerabilities and assess the level of risk to determine if the risk must be confronted or if it is an acceptable risk for the company. No matter how hard we try, risks will always be out there and that is why it is imperative that correct measures are taken to see the company’s vulnerabilities and to prevent exploitation. A Security Risk Assessment is the very first step of a full risk analysis and involves many different steps.…

    • 709 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    One of the fastest growing fields is information technology, because computers are a part of most people’s lives and businesses. A recurrent topic in the news today is computer hacking. Recently, several companies have been hacked into and customers’ digital information has been stolen. Even the government can’t seem to keep its information safe. Everyday, people’s identities are stolen because their online bank has been hacked into.…

    • 1772 Words
    • 7 Pages
    Great Essays
  • Great Essays

    For instance, he may inform the people that a certain candidate has withdrawn from the contest. The same case applies to national security where the hacker may inform the people, including the enemies, that the defense forces have been attacked and killed. Hackers cause the spread of false information to the people, thereby diverting the attention of the security teams from their mission (Jahankhani 218). They also label the security teams as unreliable to mutilate the image of the security departments among the public. When the public sees the security teams as less trustworthy, then there cannot be cooperation between the two parties and the result is a disfigured security stamina in the country.…

    • 1881 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Introduction Statement of the Problem Cybercrime is a word used to portray criminal action involving computers or computer networks being used as an instrument, an objective, or a setting of unlawful acts and incorporate everything from electronic cracking to denial of service assaults. It is likewise used to describe conventional misdeeds where computers or networks are used to facilitate criminal activity. Cybercrime can involve computer viruses, cyberbullying, cyberstalking, identity theft, malware, and spam. The impacts of a solitary, effective cyberattack can have huge ramifications including economic costs, stolen intellectual property and loss of confidence and trust. Criminals have been exploiting cyberspace even before the introduction of the personal computer (PC).…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    For an organization to successfully enforce its security program, it must take risk analysis and risk management into consideration. A risk analysis will identify potential threats and vulnerabilities of the systems and any existing related risks. Applying threat modeling to analyze the security of an application by identifying, quantifying, rating, and addressing the threats is crucial for the organization to prevent and mitigate any threats. Since risk is calculated by multiplying the threat by the vulnerability, the higher the threat, the higher the risk an organization may have to suffer. If the threat is zero, the risk is zero.…

    • 1541 Words
    • 7 Pages
    Great Essays