Access Millions of academic & study documents

Security Vulnerabilities101

Content type
User Generated
Subject
Computer Science
School
Southeastern University
Type
Homework
Showing Page:
1/9
Running head: SECURITY VULNERABILITIES 1
Security Vulnerabilities
Student Name
Institution Affiliation

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/9
SECURITY VULNERABILITIES 2
T-Mobile Company
Introduction
Computer systems and information system vulnerabilities are critical elements that an
organization should evaluate to avoid data loss. Computer system vulnerabilities refer to
weaknesses or flaws of a network or system that can be penetrated to cause damage to the
organization by allowing hackers to access systems (Stallings & Brown, 2015). The information
system refers to integrated components of data collection, storage, and organizing. The
information system contains computer hardware software, databases, and human resource;
hence, computer systems vulnerability is a vulnerability of the entire information systems
(Grzebielec, 2020). In a situation where computer and information system vulnerabilities occur,
the organization is likely to lose integrity, accountability, authenticity, and confidentiality. I work
at T-Mobile Telecommunication Company, which has a role in protecting user's data. Due to
increased threats of losing user's data, the computer and organization system might be
vulnerable. Therefore, as mandated by the CEO, this report will outline the necessary
information and computer system vulnerabilities in the organization that could lead to loss of
confidentiality, integrity, and accountability.
Types of Security Vulnerabilities
To assess the organization’s actual examples of vulnerabilities, I divided the security
vulnerabilities four different forms. Most people tend to think that vulnerabilities can only result
from human factors without considering other factors. These factors include;
Network Vulnerabilities

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/9

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 9 pages?
Access Now
Unformatted Attachment Preview
Running head: SECURITY VULNERABILITIES Security Vulnerabilities Student Name Institution Affiliation 1 SECURITY VULNERABILITIES 2 T-Mobile Company Introduction Computer systems and information system vulnerabilities are critical elements that an organization should evaluate to avoid data loss. Computer system vulnerabilities refer to weaknesses or flaws of a network or system that can be penetrated to cause damage to the organization by allowing hackers to access systems (Stallings & Brown, 2015). The information system refers to integrated components of data collection, storage, and organizing. The information system contains computer hardware software, databases, and human resource; hence, computer systems vulnerability is a vulnerability of the entire information systems (Grzebielec, 2020). In a situation where computer and information system vulnerabilities occur, the organization is likely to lose integrity, accountability, authenticity, and confidentiality. I work at T-Mobile Telecommunication Company, which has a role in protecting user's data. Due to increased threats of losing user's data, the computer and organization system might be vulnerable. Therefore, as mandated by the CEO, this report will outline the necessary information and computer system vulnerabilities in the organization that could lead to loss of confidentiality, integrity, and accountability. Types of Security Vulnerabilities To assess the organization’s actual examples of vulnerabilities, I ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents