Vulnerability, threat and risk
A threat, Vulnerability and Risk are factors related to cybersecurity and cyber-attacks. A warning is an agent that may want to or definitely can result in harm to the target organization. Threats include organized crime, spyware, malware, adware companies, and disgruntled internal employees who start attacking their employer. For better computer security, there are better guidelines which are recommended for safety. It is first recommended to use efficient antivirus software, especially those not limited to computers only but also internet protection and guarding against cyber threats. It is also suggested not to download untrusted file attachments because they are likely to carry malware (Shameli-Sendi et al.,2016). Also, one should not download software from those untrusted sites because they are likely to come with viruses which are expected to harm your systems as soon as the software is installed.
Vulnerability – Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Vulnerability testing is essential to ensure a progressive systems security. It is also advisable to identify weak points to develop a quick response (Chatzipoulidis et al., 2015). Moreover, the data should be backed up and stored in an off-site location
Risk is where threat and vulnerability overlap. That is, we get a chance when our systems have a weakness that a given threat can attack. Any policy should have a risk management strategy. It is advisable to assess the risk as well as determining of the needs. Secondly, is the inclusion of the stakeholders’ perspectives as well as a designation of a central group of employees who are knowledgeable in risk management who then implement the necessary policies as well as related controls (Vallone et al., 2017).
References
Shameli-Sendi, A., Aghababaei-Barzegar, R., & Cheriet, M. (2016). Taxonomy of information security risk assessment (ISRA). Computers & Security, 57, 14-30.
Chatzipoulidis, A., Michalopoulos, D., & Mavridis, I. (2015). Information infrastructure risk prediction through platform vulnerability analysis. Journal of Systems and Software, 106, 28-41.
Vallone, D., Taylor, P., Venables, P. J., & Huang, R. Y. (2017). U.S. Patent No. 9,571,517. Washington, DC: U.S. Patent and Trademark Office.