Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: August 16th, 2022

Threats, risks, and vulnerabilities to achieve a holistic view of risk across the

Step 5: Security Weakness Assessment
Name
Institution

Threats, risks, and vulnerabilities to achieve a holistic view of risk across the entity
From the information gathered, it is evident that the company’s network systems do not have a strong security system, and this is one of the reasons why the attackers were able to access the system. In other words, Boeing’s firewall protection is inadequate. The company is also vulnerable to attacks that emanate from cloud computing since it has not invested in a cloud computing provider that could secure this system. Boeing faces security risks from its employees as well. Employees with malicious intents can attack its systems utilizing information and access routes provided to them (Aycock, 2010 – Essay Writing Service: Write My Essay by Top-Notch Writer). Application threats are also present. When employees in the company share files with sensitive information over phone applications, those files could be exposed to attacks by cyber criminals. The risk of attack in the company may also emanate from the internet of things (IoT). Utilizing web services through applications in the phone expose the organization to IoT. This is attributable to the fact that the web is interconnected via multiple devices, and attackers can easily access one of these devices (Street et al., 2017). Another source of vulnerability comes from flaws in the development of software. Due to tight schedules or deadlines software developers may create products with flaws, which may in turn become vulnerabilities because hackers usually take advantage of them to initiate attacks into the organization’s database via different cyber-security attack methods.
Areas needing improvement
Various areas should be improved. From a technology perspective, Boeing needs to focus on redefining its current firewall settings and thus prevent unauthorized access to its systems. The company should also seek the services of a cloud computing company who will secure its cloud. Boeing should install intrusion detection and prevention systems, i.e., the IDS and IPS tools. These will assist the staff in the IT department to pin point and safeguard their wired and wireless networks against a number of security types of threat. From a people perspective, the company should ensure that confidential information is not sent to the public. The company can also cancel the credentials of workers who leave the company and make habitual changes in passwords to avert insider attacks from taking place. From a policy perspective, Boeing needs to provide rules and regulations that guide employees in the use of technological devices. This will ensure that they do not expose the company’s sensitive information to attacks.
Potential risks associated with maintaining the current security exposure include Man-in-the-middle attacks, Denial-of-service attack, phishing attacks and SQL injection. A man-in-the-middle attack takes place when the digital transmission channel is penetrated by the hackers allowing them to steal information that flows through it, particularly if the information is not encrypted (Dudorov, Stupples, & Newby, 2013). Denial-of-service attack occurs when a system or network is flooded with traffic with the aim of draining most of its bandwidth making it unable to accomplish genuine requests (Dudorov, Stupples, & Newby, 2013). Hackers usually implement phishing attacks via mails where the attacker sends multiple emails to unsuspecting targets, the main goal being to set up a malware into their gadgets which would then provide them with a leeway to steal important information. Attacks that pertain to SQL occur when hackers put in a number of malicious codes into the server. This then forces this server to expose information that would be retrieved easily.

References
Aycock, J. (2010 – Essay Writing Service: Write My Essay by Top-Notch Writer). Spyware and Adware. Berlin, Germany: Springer Science & Business
Media.
Dudorov, D., Stupples, D., & Newby, M. (2013). Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems. 2013 European Intelligence and Security Informatics Conference. doi:10.1109/eisic.2013.13
Street, J. E., Nabors, K., Baskin, B., & Carey, M. J. (2017). Dissecting the Hack: The
Forbidden Network, Revised Edition. Rockland, MA: Syngress.

Order | Check Discount

Paper Writing Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Professional Writers

We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing

Discounted Prices

Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.

AI & Plagiarism-Free

Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.

How it works

When you decide to place an order with Nurscola, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.