CSEC 610 Individual Assignment Essay

Words: 3211
Pages: 13

CSEC 610, University of Maryland University College
July 12, 2014

Cybersecurity Vulnerabilities Facing IT Managers

Cybersecurity Vulnerabilities Facing IT Managers
Table of Contents
Introduction ………………………………………………………………………………………………………………… 3
Types of Vulnerabilities ………………………………………………………………………………………………. 5
Important Vulnerability, Impact & Solutions ……………………………………………………………….. 8
References …………………………………………………………………………………………………………………… 12

Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem
…show more content…
Vulnerabilities in web applications invite XSS exploits and SQL injection which are the most common types. Below you can see in the image the evolution of reports caused by SQL injection and XSS exploits over the years.

This next section we will discuss some more types of security vulnerabilities, more specifically vulnerabilities with regards to hardware. Many people assume that hardware vulnerabilities have the lowest security concern compared to other types of vulnerabilities like software, networks and people that use them simply because they can be stored up in secure environments. The truth is even hardware vulnerabilities can be easily susceptible to attacks. Hardware in general have a longer lifespan than software because simply with software you can upgrade it and install new patches/builds even after deployment. With hardware you once you purchase it, you are most likely going to keep it for a while. When it does become obsolete and ready to be disposed a lot of organizations make the simple mistake of not securely disposing the old hardware properly which in turn opens up the door for intruders. Old hardware have software programs installed on them and other things like IC transistors which can help hackers learn a lot more about the organization and help lead to future attacks (Bloom, Leontie,