Threats & Vulnerabilities: Security and Your Business
by Jim Cavanagh

 

Abstract:

 

This is a story about security threats and vulnerabilities. This is a story about your business. You will benefit a lot more from this story if you would pause from time to time and ask the questions "What does this mean to me personally?" and "How can I take action on this in my own business?"

 

Like any story we have specific points we must cover. We must answer the Who? What? Why, When, Where and How of organizational security. And though the specifics will vary from organization to organization there are some similarities across most businesses. By the end of the story you will have a much better idea of:

 

bullet

WHO might wish to compromise your information, do harm to you or your employees or exploit your products or assets to attack other organizations or compromise our national defenses.

bullet

WHAT these attackers might do, and what they have done to other organizations.

bullet

WHY the security situation is as it is today, the attackers do what they do and might select you as a target for their attacks.

bullet

WHEN the attackers are most likely to strike.

bullet

WHERE their attacks are most likely to focus and ...

bullet

HOW they do their jobs.

 

In these few pages we are not, of course, able to provide a full range of information on all of these topics, nor is that our intent. Our intent is to help you begin the thinking process, to stimulate discussion and debate and kick-start the process of organizational security awareness and planning.

 

bullet

Download paper
bullet

Approx. 450 kB

bullet

Click here for help with .pdf downloads.

bullet

Related papers:
bullet

Network Security: The Business Value Proposition

bullet

Security Vulnerability Audit: Assessing Your Organization's Security

bullet

Secure Business Telephony with VoIP

bullet

Four Steps to Improved Security: Prevention, Detection, Forensics and Response

bullet

Return to Security menu

This research report is reproduced by special arrangement with our partner, The Consultant Registry.

 

About the author:

 

James P. Cavanagh has been intimately involved with sales, marketing, engineering, public and private network design, installation and training of ATM, Frame Relay, IP, and DSL since their early commercialization. In the area of traditional consulting, Mr. Cavanagh boasts a long list of recognizable manufacturers in the emerging IP networking arena, as well as traditional telephony, carriers and service providers, and end-user organizations. Mr. Cavanagh has helped his clients with everything from product specification to network procurement, design, integration, installation and engineering.

 

Mr. Cavanagh is the editor of books on multimedia networking and network security, as well as author of Frame Relay Applications: Business and Technology Case Studies. He is currently writing a book on optical networking, and starting a new web site covering domestic US and International telecom regulatory and legal issues. Mr. Cavanagh is also a frequent guest on panels at industry conferences, has been an instructor for the International Communications Association's (ICA) Summer Program at the University of Colorado at Boulder since 1992. Additionally, Mr. Cavanagh also provides training on ATM, Frame Relay, Emerging Technologies, LAN and TCP/IP Integration, Telecom and Datacom Fundamentals and a variety of other subjects.

 

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.