Network Vulnerabilities and Controls
Computer networks are constantly under threat from many different sources of attacks. In order to get a clear understanding of the different views on computer security and its characteristics, it is important to define a network. This term means a group of computers that have been interconnected to communicate to one another using electrical signals. The network can be either wired or wireless and the most common of them nowadays is the wireless computer network. The internet or wide area network can link very many computers that are widely and geographically apart.
Computers are therefore linked to communicate with one another via the internet. However, these same computers are prone to attacks from all different angles. Any unauthorized access to ones computer can be defined as an attack since in the process, valuable information may be retrieved from the computer or even deleted. The information may be defined as an asset by many scholars and bodies with the international standards organization (2009) defining an attack on the computer which is the asset as any "attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset."
These attacks can either come from within or from outside an organization via the internet. Some of the threats that computer systems are vulnerable to range from viruses, spyware, malware, viruses, inception of data identity theft and hacker attacks (cisco.com). In this paper the focus will mainly be on hackers and how they operate.
Hackers defined
Bruce sterling (1993) defined a hacker as "a person who breaks into computers and computer networks for profit, as protest, or sometimes by the motivation of the challenge." Although they term themselves as computer experts, many countries businesses and individuals see the specified hackers as criminals. Some are good others are bad but they all depend on the vulnerability of the computer network to carry out their...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now