Reply To: OCU C)SP B Week 05 Lesson 10 Discussion
Companies face and multitude of risk and vulnerabilities while maintaining the safety of their network. This may come in the form of physically protecting a data center, to restricted areas or simply restricting access without proper credential to buildings. Vulnerabilities may also come in the form of software issues where users are primarily, the biggest risk. When overall looking at system vulnerabilities lot of times human error is the number one cause. A lot of times this is prevented by mitigating policies that help protect against these type of risk. Some of the policies to protect a companies network are encryptions or cyber security like firewalls and anti-firmware. It is also very important for a company to have the most current version of an application that it is using for its system. When a company uses outdated programs the company is more susceptible to invasion. Despite many companies using a legacy system, it is still best to use a more up-to-date version. Other types of policies that are put into place are business continuity plan. This type of plan will prepare a company to operate while experiencingy system issues. I believe this policy is one of the most important only second to access control.