This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Potential Security Vulnerabilities

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

Potential Security Vulnerabilities

 

There are several manners in which potential vulnerabilities can be reduced. The remote employers must make use of the VPN instead of the public Wi-Fi.  Additionally, there should be an emphasis on the usage of the strong password and the password should not be shared among unauthorized users. More importantly before clicking, the user should read all the cautions. In order to offer protection against intrusion attempts, the malware canners should be used to scan the malware in the system (Vargheese, Collinson, & Mastho, 2018). Further, the devices in the system should be fully encrypted. To forecast future threats in the system, the company must focus on the user’s behaviours. More so, the physically stored data must be protected more.  Other practices that should be enforced include installing the dynamic as well as an online firewall with the user-defined policies. Filtration of the open ports must be implemented as well. Sensitive directories should be hidden at the same time.  Default logins for different nodes should be changed.

To limit the potential vulnerabilities and then offer protection to the system the organization should improve and describe integrity, availability as well as the confidentiality of the data resources.  The three aspects are crucial in the course of reducing potential vulnerabilities. In order to minimize the incidents of vulnerabilities, the organization must put in place a strong password. The password should comprise of special characters letters as well as numbers (Stuckman, Walden, & Scandariato, 2016). The system scanner is applied in this case to scan both the virus and the malware. No unauthorized individual should be allowed to enter the room where the data is physically stored. The protection against the intrusion attacks can be reached through many manners. Enabling access of the login pages from the particular IP address only through either server or the remote admin system. Always attempt limits as well as for timeouts. For the case of violation of policies, IP should be blocked. All in all a better cyber ecosystem must be built with the help of incorporation of intelligent security systems as well as system .

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

 

Stuckman, J., Walden, J., & Scandariato, R. (2016). The effect of dimensionality reduction on software vulnerability prediction models. IEEE Transactions on Reliability66(1), 17-37.

Vargheese, J. P., Collinson, M., & Mastho, J. (2018). How can persuasion reduce user cybersecurity vulnerabilities?. In 2018 Convention of the Society for the Study of Artificial Intelligence and the Simulation of Behaviour, AISB 2018.

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask