Question
Description: do some additional research. Summarize the Type you have select, provide at least two additional facts about this area not covered in the lesson
Description:
do some additional research. Summarize the Type you have select, provide at least two additional facts about this area not covered in the lesson and find at least one example of where this type of vulnerability lead to a compromise or breach.
Write up your findings in a half page paper.
Impact of Security Vulnerabilities
Never dismiss a small vulnerability because its impact on its own is negligible. Seemingly innocent vulnerabilities can be combined into something much more dangerous or, at the very least, be used to aid in an attack. Sometimes a small vulnerability is overlooked as the impact is not seen as dangerous. It is way too common to disregard vulnerabilities because they have no big security impact by themselves. What is often missed in this type of scenario is what happens when vulnerabilities are combined. This is often called chain vulnerabilities.
The impact of security breaches is not only estimated to reach $2.1 trillion dollars globally by 2019. When calculating the true impact of a breach, one must not only take into account the tangible loss of what the attacker gets away with, but also the extensive cost of recovery and implementation of new/better safeguards in addition to the lost opportunity costs from downtime and customers jumping ship. Often a company has to do extensive re-marketing of itself to regain consumers trust, "win back" the ones who left, and persuade potential customers their products are once again trustworthy. The costs can be staggering and some companies never recover.
The 2017 Cyberthreat Defense Report from the CyberEdge Group found that an alarming 79 percent of networks were breached last year at least once. Companies ranging from Wendy's, Neiman Marcus, and Sony - to Ashley Madison and Yahoo have fallen victim to high-profile, damaging, and embarrassing attacks they're still recovering from, and the volume and severity of attacks is accelerating. The stakes can't really get higher than a politically motivated hack that may have influenced the outcome of the US presidential election.
The internet is dangerous, to say the least, but companies must use it to conduct business today. As IBM Chairman, CEO, and President Ginni Rometty put it, cybercrime "is the greatest threat to every company in the world." The evolution of cybercrime means we must treat digital security as a top priority, regardless of whether you sell cheeseburgers or business analytics
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started