Open Access Open Access  Restricted Access Subscription or Fee Access

Role and Importance of Network Vulnerability Assessment in Organizational Network

Ajay Kumar

Abstract


Abstract
In today’s online business scenario, vital data of the organization is accessed, stored, and transferred electronically. The security of this information and the systems storing this are critical to the reputation and prosperity of organization. Therefore, vulnerability assessments of computer systems should be a routinely employed activity to obtain a complete evaluation of the security risks of the systems. However, the methods for performing vulnerability assessments are varied and cost prohibitive. The purpose of this article was to investigate a convenient, efficient, and cost-effective method for conducting vulnerability assessments. The results show that a successful method employs the strengths of software and hardware. Running a vulnerability assessment is fundamental for any organization. When an administrator is in the process of securing his network, there are a lot of things he needs to bear in mind. Unfortunately, when it comes to network security most stop at patch management and antivirus software. Little do they know that they also need to check configurations, known issues in third-party applications, as well as potentially troublesome hardware that in their default configuration can be harmful to the network’s security? These processes are what constitute a vulnerability assessment. In this article, we have discussed some of the commonly useful and innovative methods for vulnerability and its impact.

Keywords: network, security, WLAN

Full Text:

PDF

References


Álvarez-Miranda E., Candia-Véjar A., Carrizosa E., et al. Vulnerability assessment of spatial networks: models and solutions, In: Combinatorial Optimization. Springer International Publishing; 2014, 433–44p. DOI:10.1007/978-3-319-09174-7_37.

Handbook of International Electrical Safety Practices.

US Department of Energy. Vulnerability Assessment Methodology, Electric Power Infrastructure. 2002.

Turner B.L., Kasperson R.E., Matson P.A., et al. Science and technology for sustainable development special feature: a framework for vulnerability analysis in sustainability science, Proc Natl Acad Sci. 2003; 100(14): 8074–9p. DOI:10.1073/pnas.1231335100.

Ford J.D., Barry S. A framework for assessing the vulnerability of communities in the Canadian arctic to risks associated with climate change, Arctic. 2004; 57(4): 389–400p. DOI:10.14430/arctic516.

Adger W.N. Vulnerability, Global Environ Change. 2006; 16(3): 268–81p. DOI:10.1016/j.gloenvcha.2006.02.006.

Fraser E.D.G. Travelling in antique lands: using past famines to develop an adaptability/resilience framework to identify food systems vulnerable to climate change, Climatic Change. 2008; 83(4): 495–514p. DOI:10.1007/s10584-007-9240-9.

Patt A., Dagmar S., Klein R., et al. Assessing Vulnerability to Global Environmental Change: Making Research Useful for Adaptation Decision Making and Policy. Paperback ed., 1st. Edn. London: Earthscan; 2010. ISBN 9781849711548. Cite uses deprecated parameter |coauthors=(help).


Refbacks

  • There are currently no refbacks.