ipl-logo

Pros And Cons Of King Entertainment

1478 Words6 Pages

III. Exploitations
King Entertainment's Security Teams must be up to date on security papers and databases and be familiar with all found exploits and how to fix them. Monthly patching cycles will patch all of our environments starting with Staging, then Development, next is Preproduction, then most importantly Production, and ending with Disaster Recovery sites which must mirror Production. This exact order is to ensure the functionality of all systems with all patches, hotfixes, and updates prior to Production level implementation. Below are the different types of exploits, their explanation, and recent examples from released security papers.
A. Remote Exploits
This exploit group contains exploits for remote services, remote applications, …show more content…

V. Pros and Cons
The Pros of mitigating security breaches and exploits means that your data is safe, your integrity as a company or person is whole, and attackers get nothing for their efforts. The Cons however can be a bit daunting; taking outages, working overtime, working after hours, working to upgrade the whole environment, never ending cycle of updates/patches/hotfixes, etc. Not to mention the fact that sometimes patching breaks the application or hardware functionality. Or taking in the fact that adding security measures like IPSec can make maintaining the environment and tracing down networking problems that much harder, or even impossible. Or the sheer fact that sometimes buckling down hard on the security measures of an environment can throttle the performance severely and could segregate necessary components that need to be able to interact. This really makes the whole effort of mitigation, adding security, and plugging holes feel like a battle of attrition that can't be won. Sometimes the sheer cost of it can seem to outweigh the benefit. And that is exactly when companies get in trouble. When the security measures get weaker and the plugging of holes slows down, that is when your company is at its most vulnerable. Even though some CEOs or CFOs don’t seem to understand this fact, it must be understood that cybersecurity is of the upmost importance. "For those businesses who haven’t yet acknowledged the severity of cybercrime, it’s time to wake up and prepare yourself for what could be a business-critical event and implement security measures that will keep your data safe." (The pros and cons of cybersecurity) Hackers and Cyber Criminals must be kept out if your company is to remain viable, trusted, and

Open Document