¶ … worst that could happen to an information system was a natural disaster destroying all information, nowadays, the category of risks has become thoroughly diversified and, because an increasing use of informational systems as data storage and processing tools, it has become more and more important to provide suitable solutions in each situations. In the paragraphs here below, we present a series of problems one may face in ensuring IT security in an organization, together with a set of solutions that may be applied. We have referred to external and internal vulnerabilities, as well as cyber, physical and social ones.
External/Internal Vulnerabilities
According to an excellent study by Gerhard Eschelbeck
, there are several generations of external threats and vulnerabilities worth discussing:
First Generation threats comprise external virus attacks, generally by email or forms of file sharing. The main characteristic of these attacks is that human action is needed in order for the virus to be replicated and spread to other computers. Examples from this category include the Melissa Macro virus, the LoveLetter VBScript worm or the SoBig virus.
Second Generation threats refer to "active worms leveraging system and application vulnerabilities"
. Viruses and Trojans are major representatives of this category, characterized by automatic replication and spreading. Common recent examples are the Slapper worm, the SQL Slammer worm and the Blaster worm.
Third Generation external threats are much tougher to handle, as the viruses and worms in this category are much more insidious, targeting viable potential victims in advance and, as such, having a faster propagation. These targets include Instant Messaging and Voice-over-IP systems. Even more worrying, traditional defenses are not always fully effective against these threats.
In terms of internal vulnerabilities, many of them seem to come from Microsoft. Indeed, according to Gerhard Eschelbeck, the top 10 internal vulnerabilities are...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now