Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Research Paper:
The operating system faced these issues due to the lackluster approach from Apple to patch their software in time. As a result, it led to risking the data of personal users. It shows that irregularities in the patching of computers affected users adversely without any fault of their own (Daily Tech, 2012).
In addition to that, the operating system of Apple is now considered as one of the most favored platform for hackers due to loopholes in the framework. Similarly, social networks such as Facebook have also been guilty of retaining an obsolete database, which led to one of the biggest security breaches in the recent era of internet (Chabrow, 2013). Thus, it can be said that personal computers are affected due to the negligence of the software vendors but its impact cannot be ignored.
Addressing the impact:
a) Software Vulnerability:
In order to address the impacts that unpatched systems have on cyber security, Lin (2006) has stressed that it is essential for organizations to develop efficient access controls as well as install regular updates for their quarantine antivirus software and firewalls. When an organization attains effective security against external access, coupled with creating increased awareness among the employees to take precautionary measures while using the internet, the impact of unpatched systems can be greatly decreased. In addition to that, the operating system providers should provide timely updates as soon as a new threat emerges (Lin, 2006).
In this regard, software developers are required to provide the enterprise consumers with timely updates and patches for the security software. As soon as a new threat is identified, developers or the hired staff should be able to provide security against the threats in the form of patches (Lin, 2006). In addition to that, the employees should be directed to use the internet in a responsible and defensive manner. They should not be allowed to visit infected websites from their workplace. In the end, it is advised that the threat of unprotected or unpatched systems should not be taken lightly by organizations and they should be given due importance.
b) Hardware Vulnerability:
The impact of system updates with regards to hardware should also not be underestimated. Older chipsets, which are near the end of their cycle, are exposed to security breach from the external environment. Organizations can overcome this problem through hiring a dedicated IT staff, which would overlook the transition from older hardware to current or next generation hardware (Villasenor, 2011). It has also been stressed that hardware vulnerability is greater as the size of the organization increases. Thus, organizations with greater resources should allocate larger resources to improving the hardware vulnerability as compared to smaller organizations (Villasenor, 2011).
Villasenor (2011) also stated that a number of steps can be taken in order to minimize the underestimated vulnerability of hardware. The first step is that the semiconductor manufacturers should adopt a change in design. The reason for this is that a changed semiconductor would eradicate the hardware vulnerability for a considerable amount of time till the hackers familiarizes themselves with the new hardware. The second step in the removal of hardware vulnerability is to establish a capability on the national level for responding to attacks in a timely manner. Thus, he has stressed the importance of a central body against cyber crimes, who would track the perpetrator and make him accountable for his actions.
The third step mentioned by Villasenor (2011) is that the chips manufacturers should carry out extensive testing on the new hardware in order to ensure that the chips are not corruptible for the foreseeable future. Such an action would prolong the useful life of hardware in terms of their vulnerability towards attacks. The fourth and final step is that there should be in0built capability in the new chips, which would enable them to identify external threats and eliminate them before they cause any damage. The aforementioned steps should be considered as a standard in the industry, which would support the objective of eliminating weakness pertaining to hardware in the cyber security of organizations.
BITS. (2011). Malware Risks and Mitigation Reports. Retrieved March 11, 2013 from http://www.nist.gov/itl/upload/BITS-Malware-Report-Jun2011.pdf
Daily Tech. (2012). Apple Admits its Macs Have a Malware Problem. Retrieved March 11, 2013 from http://www.dailytech.com/Apple+Admits+Its+Macs+Have+a+Malware+Problem/article24451.htm
Chadrow, E. (2013). Examining How Facebook Got Hacked. Retrieved March 11, 2013 from http://www.bankinfosecurity.com/examining-how-facebook-got-hacked-a-5518
Cole, E. (2012). Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization. Rockland, MA: Elsevier Science.
Lin, P. (2006). System Security Threats and Control. Retrieved March 10, 2013 from http://www.nysscpa.org/cpajournal/2006/706/essentials/p58.htm
PC World. (2009). Unpatched Applications Are #1 Cyber Security Risk. Retrieved March 9, 2013 from http://www.pcworld.com/article/172082/Unpatched_Applications_Are_1_Cyber_Security_Risk.html
Sans. (n.d.). Survival Time. Retrieved March 10, 2013 from http://isc.sans.edu/survivaltime.html
Swan, D. (2013). Cybersecurity Vulnerabilities Facing IT Managers Today. Retrieved March 9, 2013 from http://www.academia.edu/1416741/Cybersecurity_Vulnerabilities_Facing_IT_Managers_Today
Villasenor, J. (2011). Ensuring Hardware Cybersecurity. Retrieved March 11, 2013 from http://www.brookings.edu/research/papers/2011/05/hardware-cybersecurity[continue]
"Cyber Security Most Important Cyber" (2013, March 12) Retrieved October 25, 2016, from http://www.paperdue.com/essay/cyber-security-most-important-86645
"Cyber Security Most Important Cyber" 12 March 2013. Web.25 October. 2016. <http://www.paperdue.com/essay/cyber-security-most-important-86645>
"Cyber Security Most Important Cyber", 12 March 2013, Accessed.25 October. 2016, http://www.paperdue.com/essay/cyber-security-most-important-86645
Cyber Security Vulnerabilities Single Most Important Cybersecurity Vulnerability Facing IT Managers Today Cyber Security Vulnerabilities Facing IT Managers Today At present, computers link people to their finances through online banking and a number of many online applications that offer access to accounts. In addition, they provide a connection to a broad variety of information, including social media, for instance, Face book, YouTube and Twitter. Interconnectivity of the systems have made it possible for
Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met
The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and
Cybersecurity Vulnerability What are Vulnerabilities? Hardware attacks because of Vulnerabilities Hardware Data modification / injection The Scientist Argument Secure Coprocessing How organizations can best address its potential impacts Cybersecurity Vulnerability: Hardware Weakness This essay introduces the role that computer hardware weakness opens the door up for attack in cyber-physical systems. Hardware security -- whether for attack or defense -- is not the same as software, network, and data security on account of the nature of hardware. Regularly, hardware
Cyber Threats: Executive Summary It is important to note, from the onset, that even before the personal computer became as popular and as widely used as it is today, vandals still compromised computerized phone systems either for fun or for economic benefit. During the very early decades of IT, computer attacks were mostly committed by insiders, i.e. disgruntled employees of an entity (de Leeuw and Bergstra, 2007). The said attacks in
Mobile Devices on Cybersecurity One of the most important aspects of our current age and the rapid pace by which technology has developed has a direct connection to the development and use of smartphones. The first smartphones were just capable of allowing one to check one's email on one's phone: nowadays smartphones appear to be bounded by nothing. They are razor-sharp and razor fast tools for offering up efficient and
Cyber Security Currently, the internet has become a significant infrastructure, which has brought new degrees of productivity, convenience, and effectiveness for the private and public firms. The many incidents of internet attacks reflect the vulnerability of the information systems, the severity of malicious programs and the offensive nature of technology. Similarly, either attackers can hide their identity, through disabling logging facilities or altering event logs, which makes them go undetected. On