Vulnerabilities are like a thorn in the side of every single organization operating today. In the IT world, vulnerabilities are bugs or defects, a weakness or exposure of an application, system, device or service that could lead to a failure of confidentiality, integrity or availability (Liu & Zhang, 2011). They are to today's businesses what the Black Death was to Europe in the 1300s. It doesn't even matter whether the organization is connected to the Internet or not, it is still vulnerable to some type of attack. Regardless of what a company actually produces and what its mission statement states, its number one internal concern is “vulnerability.” How do IT departments and IT managers combat these threats? Every company has some type of cybersecurity team or department. Cybersecurity is defined by the United States Computer Emergency Readiness Team as the protection of that information by preventing, detecting, and responding to attacks (McDowell & Householder, 2009). Every year, companies spend billions upon billions of dollars on cybersecurity, assessing and combating possible vulnerabilities in their hardware and software systems, media, local area networks, wide area networks, corporate networks, intranets and the Internet. organization. This paper will evaluate the networks of 3 companies and evaluate their vulnerabilities. The company AWeebles, Inc has several hundred employees at its headquarters and two hundred at its shipping plant a few miles away. The LAN or local area network uses connectivity speeds of 100GB/1000GB over Ethernet circuits. Local area networks cover small geographic locations and allow individual computers to communicate with each other to share information (Pang, 2011). The Wid...... in the center of the document...... external IP address. Works Cited Liu, Q., & Zhang, Y. (2011, March). VRSS: A new system for assessing and scoring vulnerabilities. Computer Communications, 34(3), 264-273. Retrieved June 8, 2011, from Computers & Applied Sciences Complete.McDowell, M., & Householder, A. (2009, May 6). Cyber Security Tip ST04-001. In the US CERT. Retrieved June 8, 2011, from CSEC610 9041 Webliography.Valacich, J, and Schneider, C. (2012). Information Systems Today: Managing in the Digital World 5th Edition. (pages 12-37). Pearson. ISBN-13: 978-0-13-706699-5.UMUC. (2011). Customized textbook for CSEC 610 (pp. 1-13). Hoboken, NJ: John Wiley & Sons, Inc. ISBN 978-0-470-92331-3. Pang, L. (2011). The vulnerability of information systems in CSEC610. Course Module 2 posted in the University of Maryland University College CSEC 610 9041 online classroom, archived at: http://webtycho.umuc.edu
tags