Thursday, August 29, 2019
Cybersecurity Vulnerability Faced by IT Managers Today Essay
Cybersecurity Vulnerability Faced by IT Managers Today - Essay Example Although different forms of weaknesses can result in various vulnerabilities there is one particular threat which can be side lined as the most potent threat, its scope of impact is relatively large and can create havoc and destroy the purpose of I.T firms and managers. The possible vulnerability can be mitigated through safe practices and protective layers of security that ensures authentication. This can be achieved through multi- tier protective layers within the system. This paper looks into the different dimensions of the vulnerabilities and responsibilities on behalf of the respective departments. This paper would help identifying and further creating a mechanism for safe operations and security of the organizations, their clients. Note: the body of this paper should include at a minimum a complete description of the vulnerability, the reasons why it is the most important, the impact of this vulnerability on organizations and how organizations can best address its potential impacts. The single most important cyber security vulnerability faced by IT managers at the present is cyber security governance. There are weaknesses that that exist in cyber security governance to include personnel management, policies, and procedures. The weaknesses of cyber security governance have been noticed at all scales, levels, and sectors such as inadequate procedures, undertrained personnel, and failure of leadership at all levels. These weaknesses of cyber security governance have been identified by the Department of Homeland Security and proposals have been initiated to bring about change. Cyber security consists of three fundamentals such as personnel, operations, and technology. In order for all three fundamentals to be successfully implemented, active involvement is required by personnel who are responsible for the governance of that organization. Vulnerabilities may be created or exist when there is an
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.