Tuesday, 24 December 2019

Vulnerability in Computer Security

A computer vulnerability is a cyber security term that refers to a defect in a system that can leave it open to attack. This vulnerability could also refer to any type of weakness present in a computer itself, in a set of procedures, or in anything that allows information security to be exposed to a threat.
It is possible for network personnel and computer users to protect computers from vulnerabilities by regularly updating software security patches. These patches are capable of solving flaws or security holes found in the initial release. Network personnel and computer users should also stay informed about current vulnerabilities in the software they use and look out for ways to protect against them.

Common Computer Security Vulnerabilities

The most common computer vulnerabilities include:
  • Bugs
  • Weak passwords
  • Software that is already infected with virus
  • Missing data encryption
  • OS command injection
  • SQL injection
  • Buffer overflow
  • Missing authorization
  • Use of broken algorithms
  • URL redirection to untrusted sites
  • Path traversal
  • Missing authentication for critical function
  • Unrestricted upload of dangerous file types
  • Dependence on untrusted inputs in a security decision
  • Cross-site scripting and forgery
  • Download of codes without integrity checks

Causes and Harms of Computer Security Vulnerabilities

Computer system vulnerabilities exist because programmers fail to fully understand the inner programs. While designing and programming, programmers don’t really take into account all aspects of computer systems and this, in turn, causes computer system vulnerability. Some programmers program in an unsafe and incorrect way, which worsen computer system vulnerability.
The harm of computer system vulnerability can be presented in several aspects, for example, the disclosure of confidential data, and widespread of Internet virus and hacker intrusion, which can cause great harm to enterprises and individual users by bringing about major economic loss. With the steady improvement of the degree of information, very severe computer system vulnerabilities can become a threat to national security in the aspects of economy, politics, and military.
Computer security vulnerability can harm five kinds of system securities that include:  Reliability, confidentiality, entirety, usability, and undeniableness.
  • Reliability: This refers to reducing incorrect false alarm in the operation of a computer system and enhancing the efficiency of a computer system.
  • Confidentiality: This refers to protecting users’ information from disclosure and getting by unauthorized third party.
  • Entirety: This system security requires that information or programs should not be forged, tampered, deleted or inserted deliberately in the process of storing, operation and communication. In other words, information or programs cannot be lost or destroyed.
  • Usability: This ensures that users can enjoy the services offered by computers and information networks.
  • Undeniableness: This security refers to guaranteeing information actors to be responsible for their behavior.

Use Endpoint Security to Protect all Endpoints

Endpoint Security also known as Endpoint Protection is a centralized approach that focuses on protecting all endpoints – desktops, laptops, servers, smartphones, and several other IoT devices – connected to the corporate IT network from cyber threats. This methodology enables effective, efficient, and easier security management. Some vendors offer Endpoint Security systems that include firewall, antivirus, and other high defined security software.

No comments:

Post a Comment