Get help now
  • Pages 4
  • Words 951
  • Views 50
  • Download

    Cite

    Louie
    Verified writer
    Rating
    • rating star
    • rating star
    • rating star
    • rating star
    • rating star
    • 4.7/5
    Delivery result 3 hours
    Customers reviews 657
    Hire Writer
    +123 relevant experts are online

    An Outline of the Risks and Vulnerabilities Inside the Business Using an Enterprise Security Plan (ESP)

    Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get help now

    124 experts online

    Risks of an enterprise take some piece of every last part of an organization and how the risks are tended to decide how the business is fruitful universally. Risks allude to any prologue to the likelihood of misfortune or harm. Risks can originate from the interior or outer sources. Both of these risks posture most noteworthy risk to the general security of a venture (Schou & Shoemaker, 2007). In this manner, an Enterprise Security Plan (ESP) outlines the likely risks by first distinguishing the vulnerabilities that exist inside the business prepare and also reviews the vulnerabilities keeping in mind the end goal to make it simple to create a moderation plan. Below are some of the Vulnerabilities experienced due to a security lapse.

    Security Vulnerabilities

    External Web Servers

    Several websites make use of web server connectors to forward appeals from an external web server to the ColdFusion runtime framework. This connector existing on the web server opens a system association with the JRun substitute administration. The ColdFusion runtime framework handles the appeal and sends its reaction once more through the substitute administration and connector. The web server connector uses web-server-particular module modules like apache and Net Scape Enterprise Server. Nevertheless, these external web servers are said to be vulnerable to threats including the SQL and other code injections attacking the internal network (Huang, 2001). The vulnerability experienced by these external web servers poses a high probability and medium impact to the security of the Enterprise. The only form of mitigation to this kind of vulnerability is the application of code websites to the current market standards.

    Hard Drive Failure

    This is a form of vulnerability that mainly involves the systems hard drives not functioning properly as required. A hard drive failure happens when hard drive glitches and the stored data can’t be gotten to with an appropriately designed machine (Ottenheimer & Wallace, 2012). A drive failure may happen sometime during typical operation, or because of an outside variable, for example, presentation to flame or water or high attractive fields, or enduring a sharp effect or ecological pollution, which can prompt a head crash. Likewise, this kind of vulnerability poses a high probability with medium impact to the workability of the enterprise. The only form of mitigation to this kind of vulnerability is to monitor the server hard drives by use of failure prediction software.

    Use of Pirated Software

    Pirated software is that particular software whose use is not authorized in any way and in a way poses unnecessary system failure. The functionality of this software is not approved, and its purpose is minimized depending on the original software lapse. Some of the problems associated with the use of this pirated software include lack of protection warranty, minimized access to customer center and lack of technical documentation (Ottenheimer & Wallace, 2012). All these are considered to negatively impact on the workability of the enterprise, and poses serious security threats. Similarly, this kind of vulnerability poses a high probability with medium impact to the workability of the enterprise, and the only form of mitigation involves application of the original software.

    Single Power Source

    Complete relying on one power source can sometimes be so dangerous to the functioning of an enterprise. For instance, when that single power source gets limited, there will be an instant system failure. Thus, this is a type of vulnerability that can be effectively mitigated by application of a dual power source and ensuring that all servers are configured to the right settings (Macaulay, 2008). In contrast to other vulnerabilities, single power source poses a medium probability with high impact to the workability of the enterprise.

    Out-Dated Antivirus

    It is advisable that any system contains an updated and well-scanning antivirus. Lack of these would automatically risk the system being infected with malicious malware and virus. Similarly, this form of vulnerability poses a medium probability and high impact to the working of the system (Know and Tell A Business Perspective on the Risk of Disclosure. 2005). The only mitigation to be applied relates to regularly updating the antivirus.

    Insufficient System Security

    When an enterprise system is not fully secured malicious data access are frequently experienced. As these processing systems get to be more-key to our day by day lives, it gets to be regularly vital that the administrations they give are accessible at whatever point we require them. We should likewise have the capacity to depend on the respectability of the systems, and subsequently the data that they hold and give (Macaulay, 2008). Likewise, our general public and our economy rely on specific bits of data being held in certainty. Thus, all our systems need to be fully secured. Similarly, this form of vulnerability poses a medium probability and high impact to the working of the system. The only mitigation to be applied relates to upgrading the security systems.

    Fires and Floods

    Fires and floods majorly cause damage to the enterprise’s data and structures and is considered to be one of the most vulnerable effects to the organization. Correspondingly, this form of vulnerability poses a medium probability and high impact to the working of the system (Saadawi, 2011). The only mitigation to be applied relates to installing physical controls to floods and fire.

    Unauthorized Hardware Added to the System

    Whenever an unauthorized hardware is merged into the system, the risk of malicious viruses or malware being introduced into the system is increased. Unauthorized hardware might include systems connected to the network hubs or segments and peripheral input or output equipment like terminals and drivers. Therefore, this type of vulnerability poses a medium probability with high impact to the working of the system. The only mitigation to be applied relates to installing the system configuration software and disabling removal media.

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need custom essay sample written special for your assignment?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    An Outline of the Risks and Vulnerabilities Inside the Business Using an Enterprise Security Plan (ESP). (2022, Nov 27). Retrieved from https://artscolumbia.org/an-outline-of-the-risks-and-vulnerabilities-inside-the-business-using-an-enterprise-security-plan-esp/

    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper