...Dear CIO, It has come to my attention that you are wondering why I should secure Windows and our Unix/Linux servers from shortcomings and vulnerabilities. I will explain to you what I plan to do about these. So, you can understand what these are I will explain to you first what shortcomings are and how they work. Next, I will explain what vulnerabilities are and how they work. Then, I will explain to you what my plan of action to ensure our network infrastructure is strong and make sure it stays that way. First, you are wondering what a shortcoming is. A shortcoming is the quality or state of being flawed. What this means is that there is kind of flaw occurring in the network whether it be one of our employees connecting their personal devices to our network to possible steal our information about the company. Same another example is people thinking the company's computers are their owns and using it to share photos on either Facebook, Twitter or Youtube. These are some examples of short comings that could affect the network. Next, your wondering what vulnerabilities is. Vulnerabilities is essentially being open to attack or damage. Now, your probably wondering what vulnerabilities we have on a network. For instance, we could have one of employees could save information not only on our servers but one a flash drive giving away are information to another company. Other examples might be hackers that work inside the company. Another example is when some one attempts to hack...
Words: 602 - Pages: 3