Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Description: do some additional research. Summarize the Type you have select, provide at least two additional facts about this area not covered in the lesson

Description:

do some additional research. Summarize the Type you have select, provide at least two additional facts about this area not covered in the lesson and find at least one example of where this type of vulnerability lead to a compromise or breach.

Write up your findings in a half page paper.

Impact of Security Vulnerabilities

Never dismiss a small vulnerability because its impact on its own is negligible. Seemingly innocent vulnerabilities can be combined into something much more dangerous or, at the very least, be used to aid in an attack. Sometimes a small vulnerability is overlooked as the impact is not seen as dangerous. It is way too common to disregard vulnerabilities because they have no big security impact by themselves. What is often missed in this type of scenario is what happens when vulnerabilities are combined. This is often called chain vulnerabilities.

The impact of security breaches is not only estimated to reach $2.1 trillion dollars globally by 2019. When calculating the true impact of a breach, one must not only take into account the tangible loss of what the attacker gets away with, but also the extensive cost of recovery and implementation of new/better safeguards in addition to the lost opportunity costs from downtime and customers jumping ship. Often a company has to do extensive re-marketing of itself to regain consumers trust, "win back" the ones who left, and persuade potential customers their products are once again trustworthy. The costs can be staggering and some companies never recover.

The 2017 Cyberthreat Defense Report from the CyberEdge Group found that an alarming 79 percent of networks were breached last year at least once. Companies ranging from Wendy's, Neiman Marcus, and Sony - to Ashley Madison and Yahoo have fallen victim to high-profile, damaging, and embarrassing attacks they're still recovering from, and the volume and severity of attacks is accelerating. The stakes can't really get higher than a politically motivated hack that may have influenced the outcome of the US presidential election.

The internet is dangerous, to say the least, but companies must use it to conduct business today. As IBM Chairman, CEO, and President Ginni Rometty put it, cybercrime "is the greatest threat to every company in the world." The evolution of cybercrime means we must treat digital security as a top priority, regardless of whether you sell cheeseburgers or business analytics

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Visual Basic Net Database Programming

Authors: Rod Stephens

1st Edition

0789726815, 978-0789726810

More Books

Students also viewed these Databases questions

Question

6. Conclude with the same strength as in the introduction

Answered: 1 week ago

Question

7. Prepare an effective outline

Answered: 1 week ago