Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Your organization has a Web based information system and it is discovered that y

ID: 3768524 • Letter: Y

Question

Your organization has a Web based information system and it is discovered that your information system vulnerable to several high risk Open Web Application Security Project (OWASP) Top Ten vulnerabilities. - What reason, conditions or circumstances may exist that may cause you to accept (risk control strategy) ail of the vulnerabilities and do nothing to protect your system? - What reason, conditions or circumstances may exist that may cause you to terminate (risk control strategy) the information system as opposed to remedying the issues associated with the vulnerabilities?

Explanation / Answer

A weakness in design, implementation, operation or internal control

1) In computer security, a weakness in automated systems security procedures, administrative controls, Internet controls, etc., that could be exploited by a threat to gain unauthorized access to information or to disrupt critical processing. 2) In computer security, a weakness in the physical layout, organization, procedures, personnel, management, administration, hardware or softwarethat may be exploited to cause harm to the ADP system or activity. 3) In computer security, any weakness or flaw existing in a system. The attack or harmful event, or the opportunity available to a threat agent to mount that attack.

The conclusion in simple way to accept the vulnerabilities are

weak design

not setting fire wall properly

proper security

wrong implementation

internal control

proper session management with credentials

security breach

******************************************************

The things that are need to terminate vulnerabilities inn simple way

flaw design

not macthing with system requirements,and not proper system study

non secured environment