Premium Essay

Hardware and Software Problems of Qwd

In: Computers and Technology

Submitted By jeremsm
Words 657
Pages 3
Hardware security details the whole lifespan of a cyber-physical system, from before it is designed till retirement. There are two aspects of hardware security which include security in the processor supply chain and hardware mechanisms that provide software with a secure execution environment. An example of such a threat is the Trojan circuit, an insidious attack that involves planting a vulnerability in a processor sometime between design and fabrication that manifests as an exploit after the processor has been integrated, tested, and deployed as part of a system. Vulnerability is the existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the computer system, network, application, or protocol involved. Vulnerability is a weakness which consists of three elements which include system susceptibility, attacker access to the flaw and attacker capability to exploit the flaw. A security risk may be considered as a vulnerability and there are vulnerabilities without risk when the affected asset has no value at all. A vulnerability with one or more known instances of working and fully implemented attacks is classified as an exploitable vulnerability. A vulnerability with one or more known instances of working and fully implemented attacks is classified as an exploitable vulnerability. The window of vulnerability is the time from when the security hole was introduced or manifested in deployed software to when access was removed, a security fix was deployed, or the attacker was disabled. Vulnerabilities that are not related to software include hardware, site and personnel vulnerabilities. A large source of vulnerabilities include constructs in programming languages that are hard to use in the right way. Threats can originate from inside and outside a network. Two common examples can be:


Similar Documents

Premium Essay

Security

...COMPANY BACKGROUND 3 SOFTWARE WEAKNESSES 4 EMAIL SERVER WEAKNESSES 4 SOLUTION 4 DATABASE WEAKNESS 5 SOLUTION 5 HARDWARE RELATED WEAKNESSES 6 HARDWARE WEAKNESSES 6 SOLUTION 6 HARDWARE POLICY WEAKNESSES 6 SOLUTION 7 REFERENCES: 8 INTRODUCTION A company that deals with making web site and web business solutions is known as Quality Web Design (QWD). The company provides its customers to provide an opportunity so that they can spread their business through the internet. The other business solutions accompanied are accounting, payroll marketing, also parts of the business process and for which it assets are employed. ABSTRACT QWD provides business solutions via Internet to its customers. The circuit used by the company may prove various flaws to security and the hardware and software used have various limitations as Microsoft share point which have limitations in supporting virtualization, upgrade whereas the web server provided by IBM provides various functionalities over the Microsoft web server. The company has a very good hardware, software, network system, the assets used by the company provide the support to the business process but there are many limitations of the hardware, software, assets and the network design. They provide the support to the companies by providing web solutions so that they can spread their business through internet. The company processes also include accounting, payroll marketing. COMPANY BACKGROUND QWD deals with making websites...

Words: 1442 - Pages: 6

Premium Essay

Sec 571 Quality Web Design

...Security Assessment and Solutions for Quality Web Design Course Project Final Executive Summary The first phase of this paper is to identify inherent security weaknesses on a specific component among one of two businesses; Quality Web Design, an organization specializing in Web site and Web site content design; and Aircraft Solutions, a well-known manufacturer in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The assignment includes identifying the organization’s weaknesses by selecting one of their assets and addressing two of the following three areas: software, hardware and policy. A general description of the company’s overview and business processes is provided, along with a list of digital assets mapped into their respective network diagrams. Phase two follows with recommended solutions to the weaknesses, and its impact to the security controls of the business. Security Assessment and Solutions for Quality Web Design Course Project Final Protecting our valuables, whether they are expressed as information or in some other way, ranges from quite unsophisticated to very sophisticated. We can think of the Wild West days as an example of the “unsophisticated” end of the security spectrum. And even today, when we have more sophisticated means of protection than ever before, we still see a wide range in how people and businesses actually use the protections available to them...

Words: 2438 - Pages: 10

Free Essay

Sec571 Security Concerns Regarding

...Business Processes 9 Budget 10 Summary 11 References 12 Company Overview Quality Web Design (QWD) is a web development organization that creates client side web application that distributes web content to a user in order to improve an existing web site. They have a basic Microsoft shop that uses a Visual Studio Team Foundation Service to host the image repository as well as Visual Studio to design, QA and develop their site. They are also utilizing Microsoft SQL Server and Microsoft Exchange. Security Vulnerabilities The two Security vulnerabilities that I am going to document are VPN Tunnel potential security breaches as well as SQL Injection attacks. These are the two areas that I believe the organization has not looked at as potential risks for issues. Security Vulnerabilities The first threat that I want to elaborate on is a hardware vulnerability that is inherent in the use of VPN Tunnels. The main threat mostly lies with users not utilizing the same security precautions that are used in the office. Often users are unaware that they have a direct link straight into their company’s network through these tunnels and will leave them unsecured. Some of the possible threats are that of exposing data as well as company resources to those that should not have access to these details. This may cause system down time, corruption of data as well as data integrity problems. Most of the threat is within the user’s control by implementing virus scan...

Words: 1671 - Pages: 7

Premium Essay

Management Information Systems

...Course Technology’s Management Information Systems Instructor and Student Resources Introduction to IS/MIS Principles of Information Systems, Eighth Edition • Stair, Reynolds Fundamentals of Information Systems, Fourth Edition • Stair, Reynolds Management Information Systems, Sixth Edition • Oz Information Technology in Theory • Aksoy, DeNardis Office Applications in Business Problem-Solving Cases in Microsoft Access & Excel, Sixth Annual Edition • Brady, Monk Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and...

Words: 223685 - Pages: 895