Davido Digital Solutions

System Vulnerability and Threats

Recent epidemic of data breaches illustrates that no computer system is immune to attacks.

Any company that manages, transmits, stores, or otherwise handles data has to institute and enforce mechanisms to;

1. Monitor their cyber environment,

2. identify vulnerabilities, and

3. Close up security holes as quickly as possible.

Distinction between cyber threats and vulnerabilities;

Cyber threats are security incidents or circumstances with the potential to have a negative outcome for your network or other data management systems.

Examples of common types of security threats include phishing attacks that result in the installation of malware that infects your data, failure of a staff member to follow data protection protocols that cause a data breach, or even a natural occurrence like earthquake that takes down your company’s data headquarters, disrupting access.

Vulnerabilities
are the gaps or weaknesses in a system that make threats possible and tempt threat actors to exploit them.

Categories of vulnerabilities;

1. Corrupted (Loss of integrity)

2. Leaky (Loss of confidentiality)

3. Unavailable or very slow (Loss of availability)

Previous Post Next Post
Davido Digital Solutions