IT3358 Information Security Concepts for the IT Professional
Unit 4 Discussion
OS and Application Vulnerability
One of the primary goals when selecting a particular technology to implement and secure an IT infrastructure is to ensure that data, operating systems, and applications are secured with competent security tools. Based on your practical experience and research on this topic, identify a vulnerability to a specific application and describe at least two (2) countermeasures or tools you would consider recommending to an organization to mitigate that vulnerability. In addition, explicate why you believe it is important for organizations to protect against this vulnerability while including the potential outcomes if this vulnerability were accepted or ignored.