Order 1005744 Security Weaknesses.docx - Running head...

This preview shows page 1 - 3 out of 5 pages.

Running head: SECURITY WEAKNESSES 1 IT Management – Security Weaknesses Name of Student Course Title Institution Affiliation
SECURITY WEAKNESSES 2 Optum360 Security Weaknesses Introduction Optum360 experiences several security weaknesses in its current operation and management style. Security weaknesses vary through possible threats, risks, and vulnerabilities. Each of the aspects of the weaknesses portrayed by the organization is based on some degree of bypasses that hinder the articulation of security measures. A detailed discussion of the security weaknesses is discussed herein. Threats Treats that contribute to security weakness for Optum360 include disclosure of internet IP and violation of best practices. This organization serves a wide range of customer base. One primary threat that the company faces is disclosing the internet IP of both users (external) and employees (internal) (Optum360, 2020). Such disclosure poses a threat to the security measures put in place to secure user data and other vital information. Violation of best practices involves incidences such as missing security headers. This kind of violation

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture