Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Compose a 1500 words assignment on vulnerability in the communication system. Needs to be plagiarism free!

Compose a 1500 words assignment on vulnerability in the communication system. Needs to be plagiarism free! In addition to that, when attackers hack into the organization’s systems and access PDF files, they may steal vital data from the body. Theft of information exposes the establishment’s operations to individuals who may be neither employees nor consulting on contract.

This study revealed that the organization does not undertake regular updates of its software, including the Adobe Acrobat and the Adobe Reader plugins. By not upgrading the plugins regularly, the company continued running Adobe on previous versions that have few security features (Straub, 2008). While using these versions, the company’s PDF files were exposed to attacks and access by unauthorized individuals.

Most employees did not have information concerning the details of the vulnerabilities that Adobe Acrobat and Adobe Reader have. As such, they were not able to detect any penetrations in the event that any occurred while they used the company files. In addition to that, the Information Technology had not taken steps to secure the applications used by the company to handle PDF files.

The Information Technology department staff acknowledge the fact that they cannot guarantee that all personnel who use the organization’s web application may make use of a patched browser. When the employees do not use patched browsers, they increase the possibility of the URL undergoing encryption.

The CVE- 2014- 0567 is a vulnerability in the Adobe Reader Application and the Adobe Acrobat. Adobe Acrobat and Adobe Reader are applications used in the viewing and handling of files in PDF format (ASB, n.p.). A vulnerability is a weakness that allows an attacker to obtain confidential files with few restrictions. The UXSS is a type of scripting that may deny the user access to the PDF file at the point at which they may want to access the file.&nbsp.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question