Skip to content

Ask an Academic

  • Home
  • Ask a Question
  • Contact Us
Picture of a data centre

Comparing Computer Vulnerabilities and Threats

September 20, 2019 by AskanAcademic.com

An outline of some ways by which computer vulnerabilities can be found and compared

Question

How would you compare the different vulnerabilities and threats to your computer?

Answer

There are numerous ways in which a user can go about comparing the different vulnerabilities and threats to their computer. Doing so is essential to protecting one’s information against a range of malicious activities, as prevention is always more desirable than cure. An effective strategy might be for a user to stay up-to-date on current threats, while also identifying potential inadequacies in their security, hardening their system where necessary. To identify current and future threats, there are a range of resources available, including the McAfee Labs’ quarterly Threats Report and annual Threat Predictions. Between these two documents, users will have an account of current threats, including the collusion that McAfee Labs has identified in more than 5,000 mobile applications (Cheng, 2016, p.2), as well as potential vulnerabilities, outlined in the organisation’s five-year cybersecurity forecast (Beek, 2016, p.2).

Armed with a greater understanding of current and potential threats, users can then utilise vulnerability scanners to identify precisely where their system’s defences could be improved. Vulnerability scanners are “automated tools that are used to identify vulnerabilities and misconfigurations of hosts” (Scarfone, 2009, p.69), identifying, for example, software that requires updating, essential patches, and compliance issues. While vulnerability scanners can produce a high volume of false positives, they are nonetheless a valuable tool in system hardening. There are several vulnerability scanners available to users (Tittel, 2016), both proprietary and open source.

References

Beek, C. (2016) Threats Predictions. [Online]. Available from: http://www.mcafee.com/uk/resources/reports/rp-threats-predictions-2016.pdf [Accessed: 11 November 2016].

Cheng, W. (2016) Threat Report. [Online]. Available from: http://www.mcafee.com/uk/resources/reports/rp-quarterly-threats-may-2016.pdf [Accessed: 11 November 2016].

Scarfone, K. (2009) Guide to General Server Security: Recommendations of the National Institute of Standards and Technology. Collingdale, PA, DIANE Publishing.

Tittel, E. (2016) Comparing the top vulnerability management tools. [Online]. February 2016. SearchSecurity. Available from: http://searchsecurity.techtarget.com/feature/Comparing-the-top-vulnerability-management-tools [Accessed: 11 November 2016].

Post navigation

Previous Post:

Employee engagement and training to improve organisational performance

Next Post:

The Difference Between Interpreters and Compilers

Search Q&As

Categories

  • Art Media and Literature (74)
  • Business and Management (256)
  • Computing and ICT (14)
  • Construction and Engineering (35)
  • Education (90)
  • Environmental Sciences (2)
  • Finance and Economics (91)
  • Health (64)
  • Languages (12)
  • Law (88)
  • Mathematics and Statistics (2)
  • Medical Sciences (19)
  • Politics and International Relations (83)
  • Research Methodology (1)
  • Science (49)
  • Social Sciences (101)

Archives

Who We Are

Askanacademic.com is owned and operated by All Answers Ltd, a company registered in England and Wales. Company Registration No: 4964706. VAT Registration No: 842417633. Data Controller No: Z1821391.

Registered office:
Venture House
Cross Street
Arnold
Nottingham
NG5 7PJ

Main Navigation

  • Home
  • Ask a Question
  • Contact Us

Legals

  • Cookie Policy
  • Privacy Policy

Popular Categories

  • Business and Management
  • Law
  • Finance and Economics
  • Health
An an Academic Logo
© 2023 Ask an Academic | WordPress Theme by Superb Themes
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Reject
Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT