Identify security measures that address these threats and vulnerabilities Any network is vulnerable at its weakest point, and criminals will try to get there in any way possible. Some just to see if they can and others for personal gain manipulated. Security measures, policies and procedures are written and tailored to meet the specific needs of an organization. Security tools are installed on networks to keep cyber criminals away. Vulnerability is a weak point in a security system. A threat is a set of circumstances that have the potential to cause loss or damage. How do we address threats and vulnerabilities? We use control as a defensive method. Control is an action, device, procedure or technique that removes or reduces vulnerability. (Pfleeger & Pfleeger, 2007) It is essential to have adequately qualified IT personnel in the security team to adequately monitor the network activity log because this log records the activities that occur in an organization's systems and on its networks. It is important that the Information Security Officer (ISO) system ensures that each person on the security team is educated and thoroughly trained on security measures, policies and procedures, as well as ensuring that each individual knows their role and what measures to take in in case the network is compromised. Time is of the essence and could be a company's lifeline when its network is attacked. Steve Forrester, vice president of sales at Jacket-X, reconnected his work laptop to the company's local area network (LAN) without following company policy; the Intrusion Detection System (IDS) alerted ISO Jack Wilson that a malicious worm was attacking the server. The worm immediately left the paper and resigned from the political letter. It is everyone's responsibility to keep the system network as secure as possible. Works CitedGeier, J. (2005). First step of the wireless network. Indianapolis, IN: Cisco PressGoodric, M., & Tamassia, R. (2010). Introduction to Computer Security, (1st ed.). Canada: Addison WesleyPfleeger, C.P., & Plfeeger, S.L. (2007). Security in Information Technology, (4th ed.). Saddle River, NJ: Pearson Education, Inc. Kent, K., & Souppa, M. (September 2006). Guide to managing cybersecurity logs. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdfThe Vulnerability of Organizational Networks and the Internet.CSEC 610 9041 online class, obtained at: http://webtyco.umuc. eduInformation systems infrastructure. CSEC 610 9041 onlineclassroom, earned at: http://webtyco.umuc.edu
tags