Verified Document

Vulnerable Areas Of Industrial Security Operations: Industrial Essay

Vulnerable Areas of Industrial Security Operations: Industrial security has become one of the most important aspects in the business world because of the need to protect the business' assets and enhance productivity. The need for industrial security is also fueled by the growth of the industrial sector that is constantly changing. The backbone of the every industrial environment or sector is security because of the vulnerable areas within these sectors. Some of the threats that a business is likely to face in industrial operations include sabotage, espionage, competition, utility industry security issues, and transportation challenges.

The banking sector is one of the industries that are likely to experience several vulnerabilities in the operations of the banks. As one of the major players in the American banking industry, Bank of America has some vulnerable areas. First, the financial institution is likely to experience espionage, which involves technical means and attempts by different agents to gain access to information....

Similar to other players in the industry, Bank of America's cyber infrastructure is vulnerable to cyber attacks. Since the nature of the attack is sophisticated, it becomes increasingly difficult for the financial institution to defend itself against (Strohm & Engleman, 2012).
Secondly, the institution's cyber infrastructure or online platform is still a vulnerable area to sabotage. Sabotage is described as an attempt to disrupt or damage the operations of a business and its productivity. Cyber infrastructure is vulnerable to this threat since an individual or group can flood the bank's website with traffic to an extent that the institution's online services are unavailable to consumers and disrupting transactions. The most common method used by such individuals or groups is DDoS or Distributed Denial of Service that takes control of commercial servers that play a critical role in the online services. In some cases, fraudsters attack internal servers and systems through initiatives launched internally by a…

Sources used in this document:
References:

McGlasson, L. (2011, January 3). Top 9 Security Threats of 2011. Retrieved May 5, 2013, from http://www.bankinfosecurity.com/top-9-security-threats-2011-a-3228/op-1

Strohm, C. & Engleman, E. (2012, September 28). Cyber Attacks on U.S. Banks Expose

Vulnerabilities. Retrieved May 5, 2013, from http://www.businessweek.com/news/2012-09-27/cyber-attacks-on-u-dot-s-dot-banks-expose-computer-vulnerability
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Document Type: Term Paper

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Security Management Defining an Effective
Words: 3174 Length: 12 Document Type: Research Paper

The reality is however that legacy systems pose the greatest potential risk to any enterprise, as these platforms are anachronistic in terms of security support, lack many common safeguards, and don't have the necessary Application Programmer Interfaces (APIs) to scale globally as a secured platform (Gupta, Roth, 2007). Legacy systems were designed in an era where single authentication for an entire enterprise system was sufficient enough, and the concept

Security and Governance Program Is "A Set
Words: 1539 Length: 5 Document Type: Term Paper

security and governance program is "a set of responsibilities and practices that is the responsibility of the Board and the senior executives." This is the procedures by which the company ensures information security in the organization. The program consists of desired outcomes, knowledge of the information assets, and process integration (ITGI, 2013). Security of information is important because of the value of information, especially proprietary, in today's business world.

Wireless Local Area Network
Words: 2057 Length: 7 Document Type: Essay

Exploring the Basics of Wireless Local Area Networks Introduction In today's digital age, connectivity plays a crucial role in how we communicate and interact with the world around us. One of the technologies that enable this connectivity is Wireless Local Area Networks, commonly known as WLAN or Wi-Fi. A Wireless Local Area Network is a type of network that allows devices to connect and communicate wirelessly within a limited area, such as a

Clausewitz / Operation Barbarossa Operation
Words: 3765 Length: 15 Document Type: Research Paper

Some contend that Hitler order Operation Barbarossa because there was the threat of imminent Soviet aggression toward Germany. This claim has been dismissed, for the most part, as Nazi propaganda. Whether or not Russia was going to attack Germany and whether or not Hitler's reasoning for wanting to preemptively strike or simply he had his eyes on the prize, both of these thoughts are make-believe thoughts. What this shows in

Cyber-Citizen, USA Cyber-Citizen USA the
Words: 5130 Length: 20 Document Type: Research Paper

The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now