This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Vulnerability, threat and risk

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Vulnerability, threat and risk

A threat, Vulnerability and Risk are factors related to cybersecurity and cyber-attacks. A warning is an agent that may want to or definitely can result in harm to the target organization. Threats include organized crime, spyware, malware, adware companies, and disgruntled internal employees who start attacking their employer. For better computer security, there are better guidelines which are recommended for safety. It is first recommended to use efficient antivirus software, especially those not limited to computers only but also internet protection and guarding against cyber threats. It is also suggested not to download untrusted file attachments because they are likely to carry malware (Shameli-Sendi et al.,2016). Also, one should not download software from those untrusted sites because they are likely to come with viruses which are expected to harm your systems as soon as the software is installed.

Vulnerability – Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Vulnerability testing is essential to ensure a progressive systems security. It is also advisable to identify weak points to develop a quick response (Chatzipoulidis et al., 2015). Moreover, the data should be backed up and stored in an off-site location

Risk is where threat and vulnerability overlap. That is, we get a chance when our systems have a weakness that a given threat can attack. Any policy should have a risk management strategy. It is advisable to assess the risk as well as determining of the needs. Secondly, is the inclusion of the stakeholders’ perspectives as well as a designation of a central group of employees who are knowledgeable in risk management who then implement the necessary policies as well as related controls (Vallone et al., 2017).

 

References

Shameli-Sendi, A., Aghababaei-Barzegar, R., & Cheriet, M. (2016). Taxonomy of information security risk assessment (ISRA). Computers & Security57, 14-30.

Chatzipoulidis, A., Michalopoulos, D., & Mavridis, I. (2015). Information infrastructure risk prediction through platform vulnerability analysis. Journal of Systems and Software106, 28-41.

Vallone, D., Taylor, P., Venables, P. J., & Huang, R. Y. (2017). U.S. Patent No. 9,571,517. Washington, DC: U.S. Patent and Trademark Office.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask