Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: September 9th, 2022

Vulnerabilities and Risks in IT

Vulnerabilities and Risks in IT

Introduction
The use of information systems and technologies has globally been associated with a particular type of risk and vulnerabilities (Igried, 2019. 1). This is despite the growing importance of using automated Information Systems in their operations as it boosts the entities towards more significant benefits. Therefore, it has become the mandate of all organizations to work on protecting their systems from the risks and vulnerabilities under the aspect of Risk Management. Through efficient risk management, an organization will understand the risks and vulnerabilities their systems are exposed to then they utilize the company’s resources to implement the protective measures for the threats.
Notably, risk management is, at times, not a trivial task considering different entities are working with tight budgets. Conversely, IT security can be a costly function. Therefore, it takes an extensive risk analysis and formulation of a feasible plan for the entity to ensure that the company’s systems are protected with optimal use of available resources (Poolsappasit, 2010). In security protection, a feasible plan will be one that has complied with ISO 27000 standards. ISO 27000 comprises six parts that provide certification guidelines, meeting security requirements, and accrediting the institutions. The utilization of the recommendations not only improves the company’s reputation for reaching international standards but also enhances its security. therefore, the organizational stakeholders are also assured that that information is secure
Research Background
IT Systems’ Vulnerabilities and Associated Risks
As indicated earlier, dealing with IT systems’ vulnerabilities begins with knowing these threats to both the hardware and software. The vulnerabilities are the weaknesses of the systems either in the procedures, design, or implementation which an attacker may exploit for malicious purposes. The vulnerabilities associated with hardware are focussing on the physical aspect of the computers. The vulnerabilities could be as simple as an addition, change or removal of devices, interception of traffic, or flooding it with traffic (Pfleeger and Pfleeger, 2007, 13). These simple disruptions could utilize having designers in place. However, attacks on the hardware could also happen physically that is damaged by physical elements such as water, electrocution, food, fire amazon others. These attacks may be accidental, but some of them are intentional. An attack such as the “voluntary machine slaughter” in which an individual intentionally harms the computer hardware or software (Pfleeger and Pfleeger, 2007, 14). Regardless of the attacks, whether deliberate or not, all the vulnerabilities will require proper physical security systems for the complete protection of the machines.
In terms of software, its vulnerabilities will encompass the flaws existing within the software system, causing it to act abnormally to be exploited by a malicious attacker. Improper processes, poor designs, programming errors are all root causes of software vulnerabilities in computer systems (Ahmad et al., 2013). The vulnerabilities can be categorized into three; software deletion, software modification, and software theft. Software deletion is typically prevented through configuration management, which also protects from its destruction or accidental replacement. However, the removal of software can quickly be done, which will cause the loss and damage of relevant information, especially where there are no proper backup systems Pfleeger and Pfleeger, 2007, 14). In terms of modification of software, it entails having the software fail or perform unintended functions.
The software can be modified to allow particular conditions to be met, which will enable the exploitation of the systems by malicious attackers. Other modifications will allow even a user who was previously not permitted to gain access to particular information. Trojan horses, viruses, trapdoors, leaks, and malware are different modifications that could be introduced into malice (Pfleeger and Pfleeger, 2007, 15). failure to have proper protection and control of the systems can easily allow the quick breach of software security.
The vulnerabilities of IT systems are extensive. Thus, this demonstrates that these vulnerabilities pose higher risks to the systems. The risks associated with the systems are typically the potential losses or damages incurred in case the vulnerabilities are exploited (Watts, 2020). These risks include financial losses, infringement of one’s privacy and confidentiality, reputational damages, legal implications, and the loss of life. A risk management plan is essential since it will ensure the organization understands its vulnerabilities and the potential threats in conjunction with the associated risks. This will lead to the formulation and implementation of risk mitigation measures in consideration of urgency and the severity of the damages in case the vulnerabilities are exploited (Watts, 2020).
Fortunately, current organizations can utilize the ISO 31000, Risk Management-Guidelines in the formulation of their risk management processes (International Organization for Standardization, 2020). These are principles, frameworks, and procedures to be followed by organizations in managing risks regardless of industry, size, or operations. The structure also helps the institutions achieve their objectives as they guide in identifying opportunities and threats, leading to an effective allocation and utilization of resources for proper handling. It is essential to note that ISO 31000 cannot be utilized for certification but can act as guidelines for the internal and external audit programs.
Research problem
Despite the extensive available information of the different vulnerabilities and associated risks to information systems, most UAE organizations have been found not to take information security with utmost care. According to the Threat Landscape Report (2019) by DarkMatter- a UAE-based Cybersecurity Firm- businesses in the UAE are running outdated software, increasing the threats of economic espionage from potential hacking companies. Apart from unsupported or obsolete software, other security weaknesses, such as the unpatched vulnerabilities, are providing cyberattackers with easy access and exploitation of company assets (Chapman, 2019). while the report fails to indicate the number of organizations that are included in the analysis, it provides a general overview of the information security aspect in UAE organizations. This is unfortunate considering the UAE has a growing prominence in becoming a digital ecosystem, and thus, there is an expectation of having cybersecurity measures.
According to Wade (2019). The UAE is experiencing multiple cyber threats; hence an effective cybersecurity program is essential for the vital business environment. Notably, these effective programs are determined by how they address the issues related to digital business, risk management, and compliance challenges. The directors to UAE Companies are the parties who are the first to be held personally liable in case of any losses and damages for IT vulnerabilities and threats. The malware attacks that many UAE organizations face are caused by employees who inappropriately use the systems or share information through mobile devices. This increases their vulnerability to cyber attackers. Global factors also determine the security of these firms in IT systems because an increase in global cyber incidents affects global and national economies significantly. Cybersecurity is affected by numerous factors in the UAE as it is in other countries.
Sebugwaawo (2019) indicates that the increase in cyberattacks demonstrates the need for awareness of IT security issues. UAE organizations need both the skills and knowledge to address the vulnerabilities and risks associated with their IT systems. There is a need to understand how the UAE government is working towards handling hardware and software vulnerabilities. Furthermore, it is essential to understand their risk management procedures and the implementation of measures to protect against the various vulnerabilities. The need to look at these challenges from the government’s side is because they act as role models in multiple issues. If they choose to take Information Security seriously by ensuring their systems have adhered to the formulated regulatory frameworks, then other organizations will put extra efforts to protect themselves as they uphold the rule of law.
An understanding of the current status of IT security in the UAE government and the country, in general, will allow the research to recommend measures that could be implemented to achieve higher security levels and mitigate any associated risks. These recommendations will consider the evolving nature of the technology world and ensure that they are updated enough to be improvised in the current organizations or sustainable security.
Research Question.
The central question to this research is: “How is the UAE Government and Respective Companies Handling the Various IT Risks and Vulnerabilities To their IT Systems?” In answering this question, the research will look into:
1. What are the Current IT Vulnerabilities and Risks Facing the IT Systems in the UAE Government And Companies
2. Regulatory Frameworks have been implemented by the UAE Government to ensure IT security is upheld.
3. What Major Cybersecurity attacks have recently occurred in the UAE and caused significant damages and losses?
4. What are the Current Measures Implemented in Dealing with the IT Vulnerabilities and Risks
Research Objective
The primary objective of this research is to understand the perspective of cybersecurity in the UAE and come up with better measures to improve security levels.

References
Ahmad, N.H., Aljunid, S.A. and Ab Manan, J.L., 2013. Vulnerabilities And Exploitation In The Computer System–Past, Present, And Future.
Chapman, C., 2019. Most UAE enterprises are vulnerable to cyber-attacks. Retrieved from https://portswigger.net/daily-swig/most-uae-enterprises-are-vulnerable-to-cyber-attacks
Igried, A.K.B., 2019. Risk and Vulnerability Analyses for the protection of Information for Future communication security Based Neural Networks* Al-Khawaldeh Igried Al-Smadi Takialddin. Journal of Advanced Sciences and Engineering Technologies, 2(1), pp.1-20.
International Organization for Standardization., 2020. ISO 31000 — Risk management. Retrieved from https://www.iso.org/iso-31000-risk-management.html
Poolsappasit, N., 2010. Towards an efficient vulnerability analysis methodology for better security risk management (Doctoral dissertation, Colorado State University).
Pfleeger, C.P. and Pfleeger, S.L., 2012. Analyzing computer security: a threat/vulnerability/countermeasure approach. Prentice Hall Professional.
Sebugwaawo, I. (2019, May 1). Cyberattacks are increasing in UAE, study says. Retrieved from https://www.khaleejtimes.com/business/local/cyberattacks-increase-in-uae
Wade, G. (2019, November 8). UAE: Cybersecurity regulations and their impacts. Retrieved from https://www.dataguidance.com/opinion/uae-cybersecurity-regulations-and-their-impacts
Watts, S. (2020). IT security vulnerability vs. threat vs. risk: What are the differences? Retrieved from https://www.bmc.com/blogs/security-vulnerability-vs-threat-vs-risk-whats-difference/

Order | Check Discount

Tags: Vulnerabilities and Risks in IT

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.