Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In the required reading article entitled SecurityScorecard Exposes Government Security Vulnerabilities Across Federal, State, and Local Levels(listed below) , the author highlights some key

In the required reading article entitled "SecurityScorecard Exposes Government Security Vulnerabilities Across Federal, State, and Local Levels(listed below)," the author highlights some key areas of significant security risk in the government sector. The security challenges highlighted in the article would likely be similar security risks inherent in the use of artificial intelligence (AI); AI software often resides in the "cloud" which makes data more publicly available and thus, at higher risk of breach.

Given the fact that there are financial and technical resource constraints in both governmental and not-for-profit agencies that contribute to security risks (according to the article), 1. Do you believe that it's still important or necessary for those types of businesses to invest in artificial intelligence? 2. Why or why not?

P.S. Posting should be 250-500 words

SecurityScorecard Exposes Government Security Vulnerabilities Across Federal, State, and Local Levels NEW YORK, March 29, 2018 /PRNewswire/ -- SecurityScorecard, the leader in security ratings, today released a new report entitled, "2018 Government Cybersecurity Report," which identifies significant security weaknesses in federal, state, county, and municipal government agencies that leave mission critical services, such as court systems, municipal utilities, bill payment services, traffic control systems, and voting registration infrastructures susceptible to cyberattacks. SecurityScorecard's research team analyzed and graded the security posture of 655 governmental entities across the country and determined that a significant portion of all assessed entities are performing poorly across key cybersecurity factors. "The majority of significant high risk issues that were identified within the government sector are related to the public availability of legacy web applications and legacy network services - many with actively exploitable conditions," said Alex Heid, head of research, SecurityScorecard. "The bureaucratic protocols of government make it difficult to quickly implement the controls needed to respond to the constantly evolving nature of software exploitation. We anticipate that these problems will continue to grow - especially as the availability and rapid adoption of emerging IoT technologies continue to expand the available attack surface area of critical government networks." U.S. Swing State Scorecard Snapshot The report specifically looked at election swing states where budget for information security resources was supposed to have been provisioned over the last several years. The prominent visibility of swing state governments during election cycles will bring increased attention to their websites and internet resources. With the naturally-occurring increased volume of normal users as a result of media coverage, there will also come an inevitable and natural increase of malicious users seeking to identify exploitable conditions to leverage in various creative ways. Further Key Insights: Government entities continue to be plagued by and perform especially poorly in; Endpoint Security, Network Security, and Patching Cadence Government employees continue to use multiple outdated browsers and applications, likely because new versions are incompatible with legacy infrastructure that remains in place in many government organizations Government agencies (and nearly all industry sectors) still have open access points, misconfigured SSL certificates, and database vulnerabilities that are susceptible to attack Government agencies are patching slowly and/or using vulnerable legacy systems and software that cannot be patched Government entities performed well in DNS Health, Social Engineering, and Application Security risk factors, compared to other industry sectors. The government continues to nurture employee security awareness and maintain good DNS health practices to protect agency information systems. Agency employees generally know not to use work email addresses and credentials for marketing lists, social networks, etc. Government agencies are also rigorously deploying web application firewalls to protect against DDoS attacks and the OWASP Top 10 Most Critical Web Application Security Risks. A complimentary copy of the report can be downloaded by clicking here. To receive a free SecurityScorecard assessment and consultation for your business, visit instant.securityscorecard.com. About SecurityScorecard Headquartered in the heart of New York City, SecurityScorecard's vision is to create a new language for measuring and communicating security risk. The company was founded in late 2013 by Dr. Aleksandr Yampolskiy and Sam Kassoumeh, two former cybersecurity practitioners who had served, respectively, as Chief Information Security Officer and Head of Security and Compliance. With cloud solutions becoming an increasingly integral part of the security technology stack, Yampolskiy and Kassoumeh recognized the need to address third- and fourth-party risk as well as better understand the security capabilities of their business partners. Since its founding, the company has grown dramatically and now counts hundreds of leading brands as customers. SecurityScorecard is backed by leading venture capital investors including Sequoia Capital, GV, and Nokia Growth Partners among others. For more information, visit securityscorecard.com.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting Tools for business decision making

Authors: kimmel, weygandt, kieso

4th Edition

978-0470117262, 9780470534786, 470117265, 470534788, 978-0470095461

More Books

Students also viewed these Accounting questions

Question

Tell me what you know about our organization and the position.

Answered: 1 week ago