Font Size: a A A

Vulnerability assessments: The pre-emptive measure towards safeguarding information technology environments

Posted on:2017-01-30Degree:M.SType:Thesis
University:Utica CollegeCandidate:Henry, ThomasFull Text:PDF
GTID:2478390014990656Subject:Information Technology
Abstract/Summary:
Computing devices are becoming an increasingly important role within organizations to meet business requirements. As more organizations rely on computing devices to meet business requirements, the risk of organizational data being exposed increases significantly and becomes a security problem that must be addressed regularly. While organizations continue to implement new technology and computing devices into the organizations infrastructure, organizations must identify how these new technology and computing devices impact the organizations security posture. This research paper will evaluate the pre-emptive measure organizations can take towards safeguarding information technology environments. Additionally, this research will identify what organizations should look at when choosing which risk management framework to implement. Additionally, this research will identify benefits of hiring external auditors to perform assessments in addition to conducting internal assessments.;Keywords: Cybersecurity, Cynthia Gonnella, vulnerability assessments, security, policies, vulnerability management, external auditors.
Keywords/Search Tags:Assessments, Vulnerability, Organizations, Computing devices, Technology
Related items