Abstract
of
Fundamental Causes of Vulnerabilities
Vulnerability is a content which has been
defined as the moderated capacity of an individual or group to antedate. As
well as it can also be described as in the form to struggles and recover from
the influence of natural or risk and threats which has been created by humans.
vulnerability
can also be defined as the hazard for the specific person which would be
related with any of the event. In this some of the information system has now
become one of the most active and significant part of the society. This will
also include some of the daily routine activities which mainly includes the
business to banking, in education, shopping, entertainment and health care
programs. Some of the scripting vulnerabilities are have the
same causes which effect the invalid assumptions which has been presented in
the system. As well as some of the root cause of the software vulnerability has
manly be depend upon the technical approaches of mitigation techniques.
Introduction
of Fundamental Causes of Vulnerabilities
Vulnerability is a content which has ben
defined as the moderated capacity of an individual or group to antedate. As
well as it can also be described as in the form to struggles and recover from the
influence of natural or risk and threats which has been created by humans. In this
study it has mentioned that the phenomenon is active as well as vulnerability
has commonly been connected with poverty which has been raised when individual
get segregate, or in the situation of stress. (Bako & Awad, 2018)Despite from this it can also be said that individual may experience
different risk as in the form of gender ethnic and social and it may also
include some other factors. Moreover, vulnerability can also be defined as the hazard
for the specific person which would be related with any of the event. The vulnerability can be further explained
through an example an equipped bank robber is the threat. In this regard
vulnerability is having a bullet proof glass among teller forces and robbers
but it is risky because the robbers have the opportunity to shoot the teller.
As well as in the system and security network has been still present but it can
be alleviated by having proper utilization of feature of security and process.
The data and software and hardware system will be vulnerable against the vast range
of hazards. The assortment of feature of security and process has been based on
overall objectives of security but that are also based on the specific
vulnerabilities of the systems which highlights the threats ich has been
presented in the system. (Bahman , Sassani, & Pilar ,
2019)
Moreover, as it has been observed that there is as strong relationship has been
presented between hazards and vulnerabilities. Furthermore, vulnerability is vary
from situation to situation.
Background
of Fundamental Causes of Vulnerabilities
In the perspective of information
technology, the vulnerability has been described as the flaw of information
technology and their products which is related with the technology and it
sanction the violation of security policy. As well as it can also be said that
managing the security issues is the most difficult task. Some of the programming
mistakes will also cause vulnerabilities. As well as they also develop the weakness
which comprises the information security. In some of the situations the
software vulnerability is also be taken as the root cause and it has been
associated with security risk which may be presented in the computer system as
well as this will also motivates some of the observations which is (Priya, 2016)related with security
issues. Despite from this some of the programmers were not be quite innovative
in such ways to make mistakes in the system or programming.
Despite from this it can also be said that
some of the spectrum vulnerabilities can also be taken as one of the causes
behind vulnerabilities. In this it can be sad that some of the wireless system
will also contribute in the public safety and some of the national communication
as well. As well as there are some of the consequences can also been observed
in tis regard in which has been presented that disruption has been obtained in
the coatings of protocol stack.
Fundamental
Causes of Vulnerabilities
In this some of the
information system has now become one of the most active and significant part
of the society. This will also include some of the daily routine activities
which mainly includes the business to banking, in education, shopping,
entertainment and health care programs. Despite from this the
enhanced nature it’s difficulty and inter-relationship which has been include
wit in the system which raise the design, manufacturing and some of the
application errors which able the system vulnerable toward the (Joanna , 2019)threats of having
security attacks. In the perspective of information technology,
the vulnerability has been described as the flaw of information technology and
their products which is related with the technology and it sanction the violation
of security policy. As well as it can also be said that managing the security
issues is the most difficult task. An attack can also be made when some hackers
indulge the data which has been attain as in the form of severe consequences. Some
of the scripting vulnerabilities are have the same causes which effect the invalid
assumptions which has been presented in the system. As well as some of the root
cause of the software vulnerability has manly be depend upon the technical
approaches of mitigation techniques.
In this paragraph some of the causes as
bene mentioned here which is reacted with security vulnerabilities. In this
regard the man cause is complexity, in which it has been described that the security vulnerability increased correspondingly and critically.
Moreover, the critical hardware and software, as well as business and
informational procedures are all announced the security vulnerability. Some of
the connectivity can also be the strength way for manipulation. Some of the
passwords can also (Savage & Stefan, 2016) be utilized to
secure the data within the system and mobile devices. In this regard some people
did not hold much awareness about this and in this they share their password with
others and their password may be leaked out from the website.
Complexity
of Fundamental Causes of
Vulnerabilities
Complexity is considered as the difficulty in order to
quantifying as well as identifying that is causal association between the potential
candidates and diversity of specific adverse events. In usual words the complexity is
considered as the se of interconnected, interdependently and spatially
distributed in the adaptive systems for the manufacturing systems.
Connectivity
of Fundamental Causes of Vulnerabilities
The internet connectivity is usually used as the
embedded technology which allows them in order to control the various things
remotely by using the interfaces of the computer by which the security of the
internet of things is rising for various challenge and security vulnerabilities.
Passwords
of Fundamental Causes of
Vulnerabilities
Passwords are the particular key or facts that are
particularly used for securing the data of information. It is used to protect
the data in common words it can be said that the passwords is lock that is used
to protecting and securing the information. It has strong connection and
association among the vulnerabilities of the products.
Design
Flaws of Fundamental
Causes of Vulnerabilities
Due to the various particular design flaws the blue
tooth devices remain vulnerable and these cannot perform actively and very well
in the market and in its structure. Design flaws are required to set the set by
which the IoT can be protect from various kinds of the vulnerabilities in the
systems.
User
input of Fundamental
Causes of Vulnerabilities
The input of the user is the one of the most important
and major facts that can be the cause of the vulnerabilities in the IoT
products. Due to the performance of the user input the chances of the vulnerabilities
can be enhanced in the particular systems. Sometime these chances can be
reduced due to the effective input of the user.
Management
of Fundamental Causes of
Vulnerabilities
Management is an essential element when the person
decoded to do something and perform any thing. The good management is necessary
for any system either there must be chances of the vulnerabilities or there
would be another errors. The good management can perform very well to reduce
the vulnerabilities of the systems.
Training
of Fundamental Causes of
Vulnerabilities
Very effective and good training is ways to reduce the
vulnerabilities of the IoT and its relevant errors.
Communication
of Fundamental Causes of
Vulnerabilities
Communication can easily increase or decrease the
chances of the vulnerabilities. Even sometime the vulnerabilities are
particularly occurs due to the weak communication. In this it can be sad that
some of the wireless system will also contribute in the public safety and some
of the national communication as well.
Social
of Fundamental Causes of
Vulnerabilities
An individual may experience different risk as in the
form of gender ethnic and social and it may also include some other factors. It
can also be said that individual may experience different risk as in the form
of gender ethnic and social and it may also include some other factors.
Human
error of Fundamental
Causes of Vulnerabilities
Human error is the one of the most important reason
and facts due to which the chances of the vulnerabilities cam increase and
decrease. In the systems of IoT the human errors matters a lot. Because due to
this the data can be loses in very bad ways.
Here are some of the factors has bene
mentioned here which can be the cause of vulnerability. In this poverty has
been taken as the main factor. In this a gap as been seen among poor and rich individuals
which has been based on their income and variation in their lifestyle and these
are different from country to country. In this the owners of small land can
reduce the returns which they have been collected after having cultivation on
land and this will also decrease the security of food. Despite from this the
one who belongs to the rural areas are totally depended on the income which they
have been obtained from their land on which they done farming, and here is no way
as been left which help to again stand on their feet’s. Furthermore, some
livelihoods of society which has been lived in plans are likely be associated
with the profession of fishing and farming. Then some of the flood coming
conditions threatening their consistency which is related with there livelihoods
and they may obtain loss in this condition. as well as they many lose their
farming material and products which they have been made form the cultivated
material. (Gibb & Christine, 2018)After having flood,
they may lose their lands and, in this regard, they may did not find the proper
jobs.
Although
software bug can also be taken as one of the causes of vulnerability. The
security bug is mainly explained as the error in the flaw, failure which has
been presented in the system or programs within the computer which cause wrong
outcomes or started behave in unwanted way. Moreover, if a security bug moves
the system toward the decreased risk of vulnerability then it can also be said
that both of them did not hold the same value as compared to the bug which
holds the non-security bug which able the system to shut again and again. Despite
from this the exact security bugs develops the situation (Adger, Neil, & Safra , 2018)f powerful breaching
of data or the degenerate and is not equal to type which did not match form page
to page. security bugs can significantly be able to cause disastrous
business damage than a systematic bug, this can be happening because of the
fact that if the system will be tumbled under the control of a malevolent actor
then the development can not only be restricted.
In the computer security,
the vulnerabilities are the weaknesses that can be exploited by the threat of
the outside attack. In order to expose the vulnerabilities, the attackers are
supposed to have at least one application tools and the technique is to connect
the source to the weakness of system after detecting it. There are four basic
types of vulnerabilities in the computer system including physical, social,
attitudinal, economic and monitoring process for the evaluation of studies. Due
to complexity the vulnerabilities include operational mistakes and manual
configuration such as bad passwords. The insider malfeasance are functional
bugs, general weakness, and other purposeful attacks. Due to low internet services the chances of
external attack increases. Simple and well known passwords are mostly open to
access and attackers find it easy to reach the system by using these passwords.
The other vulnerabilities are memory safety violations, input validation
errors, race conditions, user interface failures, privilege confusion bugs and
other input validation errors. The other types of research issues are
complexity, connectivity, passwords, design flaws, training, communication,
management, human error, and social. The interconnection and system layers also
develop cyber vulnerabilities such as unauthorized access, hijacking of
control, and penetration. The passwords
are more exploit to vulnerability, and they are open to intentional, accidental
and other damages. The weaknesses and other issues that gaps in the security
are also more exploit to the threats..
Conclusion
of
Fundamental Causes of Vulnerabilities
In
this it has been concluded that it can also be said that individual may experience
different risk as in the form of gender ethnic and social and it may also
include some other factors. Moreover, vulnerability can also be defined as the
hazard for the specific person which would be related with any of the event.
The vulnerability can be further explained through an example an equipped bank
robber is the threat. In some of the situations the software
vulnerability is also be taken as the root cause and it has been associated
with security risk which may be presented in the computer system as well as
this will also motivates some of the observations which is related with
security issues. In this some of the information system has
now become one of the most active and significant part of the society. This
will also include some of the daily routine activities which mainly includes
the business to banking, in education, shopping, entertainment and health care
programs.
Some of the connectivity can also be the
strength way for manipulation. Some of the passwords can also be utilized to
secure the data within the system and mobile devices. In this regard some
people did not hold much awareness about this and in this they share their
password with others and their password may be leaked out from the website.
the
security vulnerability increased correspondingly and critically. Moreover, the
critical hardware and software, as well as business and informational
procedures are all announced the security vulnerability. Some of the
connectivity can also be the strength way for manipulation. spectrum
vulnerabilities can also be taken as one of the causes behind vulnerabilities.
In this it can be sad that some of the wireless system will also contribute in
the public safety and some of the national communication as well.
References of Fundamental Causes of
Vulnerabilities
Adger, Neil, &
Safra , R. (2018). Mobility, displacement and migration, and their interactions
with vulnerability and adaptation to environmental risks. In Routledge
handbook of environmental displacement and migration, 29-41.
Bahman , S.,
Sassani, & Pilar , R. D. (2019). Commercial Security Scanning:
Point-on-Sale (POS) Vulnerability and Mitigation Techniques. Intl Conf on
Dependable, Autonomic and Secure Computing, 493-498.
Bako, A., &
Awad, A. I. (2018). Cyber and physical security vulnerability assessment for
IoT-based smart homes. Sensors , 817.
Gibb, &
Christine. (2018). A critical analysis of vulnerability. nternational
journal of disaster risk reduction, 327-334.
Joanna , S. (2019).
An empirical study of tactical vulnerabilities. Journal of Systems and
Software , 263-284.
Priya, A. (2016).
Overview of root causes of software vulnerabilities-technical and user-side
perspectives. In 2016 International Conference on Software Security and
Assurance, 70-74.
Savage, &
Stefan. (2016). Modern Automotive Vulnerabilities: Causes, Disclosures, and
Outcomes. springer .