Davido Digital Solutions

System Vulnerability and Threats

Recent epidemic of data breaches illustrates that no computer system is immune to attacks.

Any company that manages, transmits, stores, or otherwise handles data has to institute and enforce mechanisms to;

1. Monitor their cyber environment,

2. identify vulnerabilities, and

3. Close up security holes as quickly as possible.

Distinction between cyber threats and vulnerabilities;

Cyber threats are security incidents or circumstances with the potential to have a negative outcome for your network or other data management systems.

Examples of common types of security threats include phishing attacks that result in the installation of malware that infects your data, failure of a staff member to follow data protection protocols that cause a data breach, or even a natural occurrence like earthquake that takes down your company’s data headquarters, disrupting access.

Vulnerabilities
are the gaps or weaknesses in a system that make threats possible and tempt threat actors to exploit them.

Categories of vulnerabilities;

1. Corrupted (Loss of integrity)

2. Leaky (Loss of confidentiality)

3. Unavailable or very slow (Loss of availability)

David Waithera

David Waithera is a Kenyan author. He is an observer, a participant, and a silent historian of everyday life. Through his writing, he captures stories that revolve around the pursuit of a better life, drawing from both personal experience and thoughtful reflection. A passionate teacher of humanity, uprightness, resilience, and hope.

Write your comments here

Post a Comment (0)
Previous Post Next Post
Davido Digital Solutions