Information Technology Vulnerabilities Essay

741 Words3 Pages

Information technology vulnerabilities cause a business to lose its sensitive data leading to a poor perform in its operations. They are weaknesses which expose an organization to risks/threats by allowing a hacker to interfere with the company’s information security. To assess the vulnerabilities one must first identify the areas of weakness or the ways the company’s security can be breached. This could be an internal or external situation. According to Alhazmi, O. H., Malaiya Y.K., Ray, I (2007) “The values of vulnerability densities fall within a range of values used to measure of defect density for general defects in an operating system for a particular company”. Once the vulnerabilities are identified, then the task is to assess the different ways …show more content…

2006). There are four main types of risk control strategies which will help to prevent risks are:
a) Risk Dissection – The first risk control strategy is risk dissection or analysing the risks and learning more about them. It includes identifying risks like financial, environmental, strategic etc. and analysing their impact on the business. It is the first step for a successful risk management plan.
b) Avoidance- To apply safeguards thereby eliminating the risk problems. Once the associated risks are identified the risk management team can work in accordance to reduce the potential threats. Avoiding items from the business plan that aren’t necessary but can be a risk, is one of the major risk avoidance strategy.
c) Risk Loss Control – After taking steps to prevent certain business risks, it’s important to decide a preventive strategy in order to avoid such risks from happening in the near future. This would include coming up with an alternate plan like choosing to develop a new process that reduces the risk probabilities but is also beneficial for the

More about Information Technology Vulnerabilities Essay

Open Document