Describe three factors that can delay or undermine an organization's ability to make its systems safe from attack and subsequent loss.

What will be an ideal response?

There are many factors that can delay or undermine an organization's ability to make its systems safe from attack and subsequent loss:
·      Even though popular information security technologies such as scanning tools allow security administrators to evaluate the readiness of their systems, they may still fail to detect or correct a known deficiency, or they may perform the vulnerability detection process too infrequently.
·      When a vulnerability is detected in a timely manner, it cannot always be corrected quickly. Because corrective measures usually require that the administrator install patches and upgrades, addressing the vulnerabilities is subject to fluctuations in the administrator's workload.
·      To further complicate the matter, sometimes services known to be vulnerable cannot be disabled or otherwise protected because they are essential to ongoing operations.

Computer Science & Information Technology

You might also like to view...

Today's social bookmarking services build on the concept of shared online bookmarks, which was first introduced in 1999

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ argument is used when you want to speculate about what the interest rate would be when using the RATE function

A) pv B) type C) fv D) guess

Computer Science & Information Technology