Wednesday, May 6, 2020
Questions On The Security System - 1791 Words
Abstract Security systems are delicate structures that need to be strengthened given that they are exposed to a lot of risks related to the vulnerabilities that they possess. One of the vulnerabilities that pose risks to the system is the use of default settings. Default settings are common among different people that deal with software. Therefore, hackers will always try to penetrate such systems. It is important to hire security personnel system so that they help in mitigating the risks related to the vulnerability. An effective risk management staff will mitigate the vulnerability so as to prevent future risks related to it. For instance, some will decide to put patches on the system so as to alter its default nature. This approachâ⬠¦show more contentâ⬠¦These systems control different operations such as security, mechanical processes, and communication processes among others (Drew, 2005). Arguably, these systems make organizational operations effective as long as they are maintaine d and protected from security threats. The security systems usually face a lot of risks that jeopardize the whole system as well as the organizational operations (Nyanchama Stefaniu, 2003). The threats are in most cases caused as a result of the vulnerability of the security system. Arguably, experts define system vulnerability as a firmware, hardware, or software defect that makes it susceptible. In other words, vulnerability is a weakness in the procedures of an automated system security (Drew, 2005). The main threat faced by vulnerable systems is exploitation. This is whereby an unauthorized individual gains access to restricted information and controls. Some people exploit such systems so as to steal data or money while others do it for personal reasons such as revenge. Arguably, the main cause of vulnerability of system security is the complex structure of the system. The complexity of internal security systems makes it easy for it to have flaws. As noted earlier, such flaws a re known as security system vulnerability. Vulnerability (Default Settings) There are
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment