Vulnerable Areas of Industrial Security Operations: Industrial Essay

Excerpt from Essay :

Vulnerable Areas of Industrial Security Operations:

Industrial security has become one of the most important aspects in the business world because of the need to protect the business' assets and enhance productivity. The need for industrial security is also fueled by the growth of the industrial sector that is constantly changing. The backbone of the every industrial environment or sector is security because of the vulnerable areas within these sectors. Some of the threats that a business is likely to face in industrial operations include sabotage, espionage, competition, utility industry security issues, and transportation challenges.

The banking sector is one of the industries that are likely to experience several vulnerabilities in the operations of the banks. As one of the major players in the American banking industry, Bank of America has some vulnerable areas. First, the financial institution is likely to experience espionage, which involves technical means and attempts by different agents to gain access to information. Similar to other players in the industry, Bank of America's cyber infrastructure is vulnerable to cyber attacks. Since the nature of the attack is sophisticated, it becomes increasingly difficult for the financial institution to defend itself against (Strohm & Engleman, 2012).

Secondly, the institution's cyber infrastructure or online platform is still a vulnerable area to sabotage. Sabotage is described as an attempt to disrupt or damage the operations of a business and its productivity. Cyber infrastructure is vulnerable to this threat since an individual or group can flood the bank's website with traffic to an extent that the institution's online services are unavailable to consumers and disrupting transactions. The most common method used by such individuals or groups is DDoS or Distributed Denial of Service that takes control of commercial servers that play a critical role in the online services. In some cases, fraudsters attack internal servers and systems through initiatives launched…

Sources Used in Document:


McGlasson, L. (2011, January 3). Top 9 Security Threats of 2011. Retrieved May 5, 2013, from

Strohm, C. & Engleman, E. (2012, September 28). Cyber Attacks on U.S. Banks Expose

Vulnerabilities. Retrieved May 5, 2013, from

Cite This Essay:

"Vulnerable Areas Of Industrial Security Operations Industrial" (2013, May 05) Retrieved May 24, 2019, from

"Vulnerable Areas Of Industrial Security Operations Industrial" 05 May 2013. Web.24 May. 2019. <>

"Vulnerable Areas Of Industrial Security Operations Industrial", 05 May 2013, Accessed.24 May. 2019,