Vulnerabilities in an Organization

avatar

Organization need to be prepared 24hours of a day for any security incident that occur, this security incidents that occurs can either cause a positive impact or negative impact on the growth and development of the affected organization, it's becomes important for individuals, organization to set in place different proactive measures per time.

images (17).jpeg

Image Source

Unwanted incidents that occur most of the time generate negative effects, these unwanted incidents occur as a result of the unknown vulnerabilities that already exist in the system, technologies or computers of the organization, in fact human beings can pose a vulnerability to the organisation.

Beyond the boards of organization, many cyber technologies are employed by different aspects of the society for the sake of convenience but the truth is that it has the potentials of causing negative effects on the safety of the people and the environment if the vulnerabilities that exist in them is not taken into consideration and handle properly.

Successful cyber-attack exploited the vulnerabilities present in some of these systems or technologies and attacks such as Denial of service attacks (DOS), remote to local attacks, user to root attacks, probing, attacks detection strategies, misuse/misbehaviour, reconnaissance attacks, signature-based approach, access attacks, cyber espionage, malicious attacks, cyberwar, cyber theft, cybercrime, cyber terrorism, active attacks and others compromise the integrity, confidentiality and availability of a network of system or organization results in alot financial loss and also affect the victims or many other organizations.

So, here are some of the vulnerabilities that we need to look out for

  1. Outdated security patches: when any software or patches is outdated, there is a serious need to update them immediately to close the gap created by these patches.
  2. Database SQL injection: this SQL injection occurs when an attacker sends input that explored the backend of the database. It is very important to be on the lookout for SQL injections.
  3. Weak authentication system: These is great vulnerabilities that need to be looked into, the authentication system needs to be strengthened.

It's very important to handle these vulnerabilities on time before an attacker explore them and cause a serious problem to the individual or organization.

Thanks for reading.

Posted Using LeoFinance Beta



0
0
0.000
1 comments
avatar

Congratulations @great-a! You have completed the following achievement on the Hive blockchain and have been rewarded with new badge(s):

You published more than 50 posts.
Your next target is to reach 60 posts.

You can view your badges on your board and compare yourself to others in the Ranking
If you no longer want to receive notifications, reply to this comment with the word STOP

To support your work, I also upvoted your post!

Check out the last post from @hivebuzz:

Happy New Year - Feedback from the first Hive Power Up Day of 2022
PUD - PUH - PUM - It's all about to Power Up!
Support the HiveBuzz project. Vote for our proposal!
0
0
0.000