Security Vulnerabilities and Loss of Attainable Goals

User Generated

vzqrnq2006

Programming

Description

You have been hired by a small company of 50 employees to manage its IT department. The company’s CEO meets with you and asks you to prepare a report pointing out potential security vulnerabilities at the company.

Write a report discussing security vulnerabilities that can lead to the loss of confidentiality, integrity, availability, authenticity, or accountability.

Your well-written paper should meet the following requirements:

  • Paper length: 2-3 pages in addition to required cover and references pages.
  • Include an illustrative table or a diagram that can be created or included from properly cited external references.
  • Include two external references in addition to the textbook.
  • Format the entire paper according to apa format.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, kindly find attached complete work.

Running Head: POTENTIAL SECURITY VULNERABILITIES
1

Potential Security Vulnerabilities
Student’s Name
Institution
Date

POTTENTIAL SECURITY VULNARABILITIES

2

Currently, companies provide platforms where clients and suppliers can access
information of their choice in websites. Therefore, critical information like customer personal
information, financial records, transaction record, and reports are stored in website databases. It
makes this sensitive information vulnerable because it's accessed and transmitted through a
network. Some of the vulnerabilities that can compromise confidentiality, accountability, and
authenticity of company data include; session hijacks, lack encryption, incorrect authorization,
injection of SQL and data interception. These vulnerabilities make attacks easily possible.
Failing to encrypt sensitive and critical data before transmission and storage,
compromises the integrity and confidentiality of the data. It is a serious threat to exchange
confidential information in an organization with 50 employees, where data transmission must
occur...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags