Q An essay on Vulnerabilities for weakness and design, operational, and implementation control Home, - Vulnerabilities Vulnerabilities Vulnerability refers to the weakness and design, operational, and implementation control. In order to secure a computer system, that can be made and the treats that are probable. In general, the vulnerabilities are exploited with the use of automated tools or customized script (Nazareth & Choi, 2015). Vulnerabilities in News Within organisations, it is common to find that prioritizing the durability on the basis of exploitability and severity is found, becoming ineffective. The primary reason being that the open source web server software are being used by millions of websites (Nazareth & Choi, 2015). Additionally, the encryption mechanism implemented in many of the solid state drives include opportunity of vulnerabilities such that the attackers can assist encrypted data without the knowledge of password. Not only the “Big Business”, but small business such as Cisco are also are prone to remote attacks because of default account and no available patches to counter protect (Eduard Kovacs, 2018). Opportunities and challenges The opportunities that are existing in this current scenario is to implement disruptive technology with complete understanding of the threats and loopholes that are accessible by the attackers. For example, according to authors, it is important to reevaluate and recalculate the priorities that are linked to continuous flow of new data, earnings, and risk profiles. This will enable the employees to stay focused on the matters which are of high relevance in a dynamic environment. Additionally, for an effective management it is advisable not to overlook the risk associated (Nazareth & Choi, 2015). In this consideration, property valuation of the risk that are associated with the likelihood of vulnerability that can be exploited. Analysis is associated hair with the impact of the company on macro level and effective patch management must be implemented (or made available) prior to any threat. According to authors, nowadays companies are more prone towards the application of containers and microservices (Baskerville, Spagnoletti & Kim, 2014) which have efficiency of faster and improved IT services. Also to note that, APIs provides multiple venues for the hackers to access any organizations’ data and use them for massive business disruption. Thus, the adoption of these disruptive technologies have outpaced the security concern because limited patches are available or developed in this regard. The major opportunity that exist for the company's is to collaborate with third parties and academies for development of suitable patches and antimalware systems. This approach will not only save cost, but will also provide counter-attack measures for the evolving disruptive technologies (Baskerville, Spagnoletti & Kim, 2014). Biblical principles applicable in this field Biblical principles applicable in this scenario include the following (Merkow & Breithaupt, 2014): • Principles of network security must be reviewed continuously. • The system engineering and information security service engineering must be understood in a complete manner before implementation. • System development life cycle must be summarized in explicit manner. • Priority must be given always for managing risk. Level of breaches in future The level of breach of attack to cybersecurity will remain a constant threat in future. The reason being, organizations require fast and effective IT services in order to gain advantage in market. With reasons like cost-effectiveness, desire for high performance, and gaining technological advancement, always welcome the disruptive technologies into action (Merkow & Breithaupt, 2014). However, the corresponding patches for these Technologies must also be developed in parallel. Lacking to these concerns always have the opportunities of inducing threats and possible targets for the attackers.