Cyber Security: Common Threats, Vulnerabilities, and Impacts


There are many ways that the data you are trying to protect can be compromised. Today’s attackers are experts at exploiting weaknesses of any type, attacks can originate in the digital space, the physical world, or through social interactions. Here are some examples of these vulnerabilities and descriptions of how they can be exploited.

Scenario 1

Vulnerability

The company still uses computers and servers with out-of-date operating systems, such as Windows 7 or Windows Server 2008.

Threat

Machines that use out-of-date operating systems no longer receive security updates and patches. In other words, there are no fixes for flaws or vulnerabilities that hackers may discover within these systems.

Impact

Theft or destruction of sensitive information, installation of malicious software such as ransomware, modification of user accounts to provide additional privileges to the attacker, and creation of additional back-door accounts to allow for future access and attacks.

Scenario 2

Vulnerability

The company does not encrypt CUI or sensitive information that is kept on mobile devices such as laptops or removable thumb drives.

Threat

Devices that are removed from a company’s offices are subject to loss or theft. If this happens, an attacker who steals or recovers the device will be able to view all of the information that the device contains.

Impact

Loss or theft of information and the inability to track where that information has gone for reporting purposes.

These are just a couple examples of potential threats that an organization can deal with on a day-to-day basis. For additional scenarios and for any specific questions regarding your own cybersecurity needs, contact AIM’s Cybersecurity Coordinator Paul LaPorte by phone at 315-624-9800, or by e-mail at [email protected]

Posted in