Information Security -Vulnerabilities and
Risks
Emerging Technologies in Cyber Security
(Western Governors University)
, A. Vulnerabilities and Attack Success
One vulnerability that Azumer Water had in the network was the firewall not being configured.
Pruhart Tech had deployed a firewall, but deferred the actual configuration of it. If the firewall had been
properly configured, it could have protected the network from the infiltration of Elecktores.
A second vulnerability that contributed to the success of the attack was the weak password
policies and lack of enforcement. It was stated that passwords were not required to be changed and
employees were using passwords that have been used since they started working there. This likely made