Skip to main content
Business LibreTexts

13.3: Where Are Vulnerabilities? Understanding the Weaknesses

  • Page ID
    4584
    • vendetta-157703_960_720.png
    • Contributed by No Attribution by request
    • Anonymous by request

    Learning Objectives

    After studying this section you should be able to do the following:

    1. Recognize the potential entry points for security compromise.
    2. Understand infiltration techniques such as social engineering, phishing, malware, Web site compromises (such as SQL injection), and more.
    3. Identify various methods and techniques to thwart infiltration.

    Figure 13.1

    This diagram shows only some of the potential weaknesses that can compromise the security of an organization’s information systems. Every physical or network “touch point” is a potential vulnerability. Understanding where weaknesses may exist is a vital step toward improved security.

    This diagram shows only some of the potential weaknesses that can compromise the security of an organization’s information systems. Every physical or network “touch point” is a potential vulnerability. Understanding where weaknesses may exist is a vital step toward improved security.

    Modern information systems have lots of interrelated components and if one of these components fails, there might be a way in to the goodies. This creates a large attack surface for potential infiltration and compromise, as well as one that is simply vulnerable to unintentional damage and disruption.