¶ … Dynamic and Fixed Patch Compliance Level
The goal to achieve competitive market advantages in a business environment has made increased number of business organizations to indulge in online businesses to enhance time-to-market, increase profitability and deliver innovative products. To achieve these objectives, organizations are increasingly investing in the IT (information technology) to enhance effective communication, and transfer data across businesses through LAN (Local Area Network) and WAN (Wide Area Network). Moreover, large number of businesses are switching from wired to wireless network systems to reduce operational costs, capital costs and management costs. (Nicastro, 2005). Despite the benefits that businesses enjoy from IT investments, nevertheless, organizations face inherent risks of IT vulnerabilities, and vulnerabilities can originate from network access points, poorly configured firewalls, wireless access points, and unsecured SQL databases. Vulnerabilities can also arise from weaknesses in the configuration, technology, or security policy. (Nicastro, 2005).
Objective of this paper is to investigate the important security issues facing the IT managers in the contemporary business environment. Moreover, the paper discusses various vulnerabilities and attacks that business organizations face in the contemporary business environments. The paper also discusses how patching can be employed in addressing vulnerabilities that IT managers are currently facing in the IT environments. Moreover, the study discusses the patch compliance. The paper also discusses the benefits and shortcomings of the fixed and dynamic patch compliance levels.
Overview of Vulnerabilities
The vulnerabilities refer to a weakness in the organizational IT systems, which can be exploited and consequently compromise the organizational security systems. Moreover, vulnerabilities refer to a hardware or software bug or misconfiguration that malicious individuals can exploit.
In other words, "vulnerabilities are software flaws or misconfigurations that cause a weakness in the security of a system. Vulnerabilities can be exploited by a malicious entity to violate policies -- for example, to gain greater access or permission than is authorized on a computer." (Mell, Bergeron, & Henning, 2005 p 7).
Typically, vulnerabilities can arise when there is a misconfiguration of software and hardware and poor network design that can disrupt organizational business operations. Businesses can lose enormous revenue if an attacker exploits the security loopholes because of the vulnerabilities in the network systems. The paper discusses different vulnerabilities that consist of challenges that managers face in the IT environments.
Bug Vulnerabilities
Bug vulnerabilities are the malicious program that can corrupt the information systems, which can make memory address to terminate abnormally, and an abnormally termination can lead to a failure of the operating systems. (Brumley, Newsome, Song, et al. 2006).
Technological Vulnerabilities
The network and computer technologies can develop intrinsic security weakness that can lead to the technological vulnerabilities. Typically, the vulnerabilities can arise from operating system weaknesses, protocol weaknesses, and network equipment weaknesses. For example, the ICMP, FTP, and HTTP are inherently insecure and can lead to TCP and IP protocol weaknesses. Moreover, vulnerabilities can arise from network equipment weaknesses, and network equipment such as firewalls, routers and switches can develop security weakness, which include lack of authentication and firewall holes.
In the business world, a successful hacking carried out because of these vulnerabilities can damage a company business reputation. Telang, & Wattal,(2010) argue that vulnerabilities have a great impact in business world and can cause billion dollars loss in downtime and disruption. The NIST estimates that a faulty software can cause an attack, which leads to approximately $60 Billion a year. Moreover, the Gartner Group estimated a system downtime that was caused by security vulnerabilities increased from 5% in 2004 to 15% by 2008.
Cavusoglu, Mishra, and Raghunathan (2004) contribute to the argument by pointing out that high profile vulnerabilities can cause security breaches in companies such as eBay, Yahoo and Amazon. For example, a company can lose 2.1% of their market value and market capitalization within two days of announcing the lost. Typically, the average lost of $1.65 billion worth capitalization has been recorded. A security survey carried by the Federal Bureau of Investigation in 2002 reveals that vulnerabilities account to 80% of financial loss, and the estimated average loss was between $2 million and $4 million of average lost. Moreover, the average lost of market value security breach result to a loss of $1.65 billion loss of market capitalization.
The cloud vulnerabilities between 2008 and 2011 have led to enormous data loss and leakages, and the vulnerabilities can come from known and unknown causes. The Appendix 1, 2, 3 and reveal the breakdown of the unknown cloud vulnerabilities. (Cloud Security Alliance, 2013). Major challenges that business...
Toshiba Networking Case Study Toshiba: How Personal Networking Can Be Used to Avoid High-Turnover Electronics giant Toshiba Corp.'s American business unit is facing a class-action lawsuit over how it pays and promotes women. (6), (7) Recently, the law firm Sanford Wittels & Heisler brought a $100 million gender discrimination lawsuit in federal court in Manhattan on behalf of a potential class of 8,000 women working for Toshiba in the U.S. Ibid. Sanford Wittels earlier
Once this takes place, it could mean that Toshiba may have a parts shortage (which is having an adverse effect on productivity). To address this issue, the line should be redesigned to ensure each station has its own extra supply of parts. This will help to prevent possible supply disruptions and can maintain the 300 units per day target. Where, the strategy will allow the line, to continuously function,
Toshiba’s Accounting Scandal: Business Ethics and the Media Along with Sony, the Toshiba Corporation is one of the most legendary and famous Japanese technology companies in the world. According to the “History of Innovation” section of its official corporate website, Toshiba boasts a long, proud 135-year technological history. In the past thirty years, the company has given birth to the first laptop computer for the average consumer, the first wireless laptop,
Toshiba's response to the scandal was insufficient -- shareholders were protesting months later and many stakeholders did not really know what happened. Toshiba's response was simply to replace a lot of top leadership. The company should have been more forthcoming about the nature of the fraud, so that there was better understanding of the issue. Just as important, Toshiba needed to get in front of the response to the scandal
Organizational Structure According to Pugh (1990), the organizational structure is an instrument that appears from the need to fulfill the organizational aims and objectives with the tools and activities that are available. Following the way that this process is managed, several types of organizational structures can be identified, including pre-bureaucratic structures, bureaucratic and post-bureaucratic structures, functional structures, divisional structures and matrix structures. Westinghouse organizational structure falls into several different categories. On one
Bluray Player The Blu-Ray player is a media player that is produced and marketed by the Sony Corporation. It was first introduced in Japan in 2000. Over the course of the next several years, the Blu-Ray entered into competition with the DVD, in particular the HD DVD that was championed by rival Toshiba. In early 2008, Toshiba announced that it was going to discontinue the HD DVD, effectively ceding the market
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now