question archive A system that is free of bugs, misconfigurations, and vulnerabilities proves to be a constant battle for today’s IT professional
Subject:Computer SciencePrice: Bought3
A system that is free of bugs, misconfigurations, and vulnerabilities proves to be a constant battle for today’s IT professional. With large Enterprise environments, as well as the menagerie of software and hardware configurations available, this goal has become increasingly difficult. Given that misconfigurations are becoming more and more common, and these misconfigurations can allow hackers access and control to a company’s systems, it is important to know what is out there and how to stop inappropriate access. One resource that is often used to search for common vulnerabilities is the CVE website, a collection of common vulnerabilities and exposures: http://cve.mitre.org/find/index.htmlLinks to an external site.
Explore the CVE website. After exploring some of the examples of the vulnerabilities for access control on the site, write a reflection responding to the following in this week’s discussion:
300 words
No APA Format
Citations and references required