Skip to Content

Problems caused by cyber vulnerability

November 21, 2019 by
Problems caused by cyber vulnerability
Kleber Leal by Zamak Portal
Do you know what cyber vulnerability is? It is no secret that new technologies are here to stay and are increasingly present in the lives of people and companies. However, along with all the benefits brought by this transformation, cyber attacks have also emerged. As a result, information security has become a growing concern for companies and individuals.

Are you interested in learning more about the subject? In this post, we will explain in detail what cyber vulnerability is, outline the existing vulnerabilities, and discuss the damages they can cause. Stay tuned.

What is cyber vulnerability?

In the field of computing, cyber vulnerability refers to a weakness that allows a cracker or hacker to reduce the information security guarantee of a particular system.

It is also worth noting that vulnerability in computing encompasses three elements. The more present these aspects are, the more vulnerable a system will be. They are:

  • failure or susceptibility of the system;

  • access by the intruder;

  • the attacker's ability to exploit the failure.

There are several factors, on the other hand, that can increase the security of data. The first of these is the basic principles of information security. There are currently four:

  • availability: relates to the time and access to information by employees;

  • integrity: the main objective is to ensure that a message has not been altered or tampered with by a third party;

  • confidentiality: it aims to ensure that only interested parties will have access to a certain data;

  • authenticity: it intends to identify who the sender of a message is.

There are also other practices that help reduce the vulnerability of systems. Among them are performing periodic backups, using antivirus on machines, having a firewall, etc.

What are the vulnerabilities and the damages they can bring?

There are several vulnerabilities that can occur in systems, and in this post, we will highlight the main ones. Among them are DoS, Privilege Escalation, and SQL Injection. We will address them in detail in the following sections of the article. Continue reading!

DoS

This practice is also known as denial of service attack. It is an attempt to make a system unavailable to users. The most common targets are web servers, and the attack seeks to make the hosted pages unavailable. Therefore, there is an invalidation due to overload. Most of the time, attacks are carried out in two ways:

  • forcing the system to restart or consuming all resources (processing, memory, among others) so that the system can no longer provide its service;

  • blocking the communication medium between users and the system so that they cannot communicate properly.

Privilege Escalation

By using malicious code, it is possible to increase access privileges. This includes executing malicious software or even collecting sensitive information within a company.

SQL Injection

This type of cyber vulnerability refers to the practice of injecting malicious code into applications that use SQL (Structured Query Language) databases.

How can Zamak help your company?

Zamak has extensive experience in the market and has professionals specialized in the field of Information Technology. They will help your company improve information security, prevent system failures, and enhance data preservation.

Cyber vulnerability can cause serious problems for businesses. These include data loss, system errors, computer overload, etc. Considering these issues, the topic deserves significant attention, and it is necessary to follow security policies to ensure the reliability of information.

Problems caused by cyber vulnerability
Kleber Leal by Zamak Portal November 21, 2019
Share this post
Tags
Archive