Vulnerabilities in an Organization

in hive-175254 •  3 years ago  (edited)

Organization need to be prepared 24hours of a day for any security incident that occur, this security incidents that occurs can either cause a positive impact or negative impact on the growth and development of the affected organization, it's becomes important for individuals, organization to set in place different proactive measures per time.

images (17).jpeg

Image Source

Unwanted incidents that occur most of the time generate negative effects, these unwanted incidents occur as a result of the unknown vulnerabilities that already exist in the system, technologies or computers of the organization, in fact human beings can pose a vulnerability to the organisation.

Beyond the boards of organization, many cyber technologies are employed by different aspects of the society for the sake of convenience but the truth is that it has the potentials of causing negative effects on the safety of the people and the environment if the vulnerabilities that exist in them is not taken into consideration and handle properly.

Successful cyber-attack exploited the vulnerabilities present in some of these systems or technologies and attacks such as Denial of service attacks (DOS), remote to local attacks, user to root attacks, probing, attacks detection strategies, misuse/misbehaviour, reconnaissance attacks, signature-based approach, access attacks, cyber espionage, malicious attacks, cyberwar, cyber theft, cybercrime, cyber terrorism, active attacks and others compromise the integrity, confidentiality and availability of a network of system or organization results in alot financial loss and also affect the victims or many other organizations.

So, here are some of the vulnerabilities that we need to look out for

  1. Outdated security patches: when any software or patches is outdated, there is a serious need to update them immediately to close the gap created by these patches.
  2. Database SQL injection: this SQL injection occurs when an attacker sends input that explored the backend of the database. It is very important to be on the lookout for SQL injections.
  3. Weak authentication system: These is great vulnerabilities that need to be looked into, the authentication system needs to be strengthened.

It's very important to handle these vulnerabilities on time before an attacker explore them and cause a serious problem to the individual or organization.

Thanks for reading.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!