Vulnerabilities In Computer Security

Superior Essays
As with the advances in computer technology, it appears that the world is experiencing a breakthrough with the massive explosion of computer usage has brought so many modern amenities to make our life easier although it raises a question about vulnerabilities in the computer infrastructure. As the matter of fact, today’s modern lives tend to rely on computers to reach a quest where machines are assigned to reduce human effort. Computer hacking is defined as a threat, which poses to security as the practice of modifying the features of computer system. The issues arising from the computer security have drawn satisfactory attention to look for a way of solution to approach the problem in recent year. This essay will outline the difficulties …show more content…
In addition to, it’s a potential threat for users who experience a malicious attack to make network resource unavailable by sending just a single packet to the system. It’s a specific type of attack that exploits vulnerabilities in network. Most hacker tend to break down the network system to extract the confidential information without having permission to access. The vulnerabilities found in network is due to following reasons. First, routers which share infrastructure can be affected by denial-of-service attack. Second, routers which are used at the core of the network can be affected by modifying the behaviour of router to launch denial-of-service attack. One example is massive distributed denial-of-service attacks generated by BOTNETS which is triggered to manipulate the system without user’s knowledge. ‘The attack is triggered with a single packet, absorbs all bandwidth of the outgoing link on the router, and can propagate to all vulnerable downstream routers’(Chaski, D,Wu, Q and Qolf, T 2011,pp-2). It appears that vulnerability exploited in router leads to absorbing all the bandwidth to disrupt the operation of the router so that can bring the entire network to its …show more content…
Most, if not all, computers can be inflicted by Malicious software (Malware) are hard to fix an infection found in the system. It can lead to hacking, leaking of valuable information and a vulnerable threat to security. It requires no intervention to propagate across computer networks like the flu shot. Moreover, there are many types of malware like Trojan horses, viruses, worms, rootkits, spyware which penetrates specific application to deteriorate the system thus stealing confidential data from computer. As a consequence, these malware propagates through computer hardware gradually and pave a new way to penetrate operating system. According to Ruanthala (CURIE, 2010, volume-3,p-42) states that Blended threats made up 54 percent of the top 10 malicious code submissions over the last six months of 2003. Undoubtedly, the most common channel it uses to propagate is the internet, which is regulated by automatic process compromising a host from across the internet. Until anyone suspect that the system is being manipulated, it remains unnoticed, which may crash the system

Related Documents

  • Improved Essays

    Managing Threats to Data Common threats to data consist of Botnets, DDoS (Distributed denial of service), Hacking, etc. You can manage and prevent data threats with antivirus/malware/hacking/etc software. By downloading a legitimate program you can protect your computers data. The software will alert you if there is something out of place in your computer before it’s too late, so you can get it removed.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Great Essays

    Technical Paper – Honeypot IT-548-Q1088 Information Security Submitted by Anudeep Gali Professor: Dr. Derek Holbert Southern New Hampshire University Abstract: Internet is one of the useful resources to the mankind but on the other hand possess so many threats and provides a means of attack for the Intruders. In this project we will be building a secure shell Honeypot and deploy on a public server to research the cyber attacks. Once we deploy the system, we will concentrate on recording all the attempts made by the intruder to enter the information system. We will be able to analyze the most commonly used usernames and passwords and analyze the shell commands used by the intruders to develop remedies of attacks on the original…

    • 1226 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    1. Internal Bot If an attacker is attempting to breach the enterprise, they may attempt to insert a bot within the network which will wreak havoc on the organization’s system. The internal bot addresses security at the perimeter of the enterprise. The DPI (deep packet inspection) engine will identify network malware that’s attempting to penetrate the network.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    However, with every advancement comes the criminal exploits of vulnerabilities. This criminal element help create the notion of “policing” cyberspace, which enviably lead to the development of new tactics and techniques to secure…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    College Security Risks

    • 1018 Words
    • 5 Pages

    The malware threats that I saw on the campus systems stunned me when I ran an anti-virus protection…

    • 1018 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    It’s great that each day technology is taking new phases and flourishing its potentiality, but the advancing field is also becoming a growing opportunity for invaders to breach security. By the time you recognize the attack, damage is already done, leaving you with nothing but an infected system. To prevent potential data injury, you need to be quick and proactive. Here are few steps that can help offset the deadly…

    • 409 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Having researched cybercrime and technology use among criminal populations for more than a decade, I know that both types of miscreants want to find ways into secure places – computers and networks, and homes and businesses. They have a range of options for how to get in. Software development is not a perfect process, and neither are people. We need to learn to recognize signs of hacks. Take suspicious emails for example; hackers often send…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Carry On is a good source of knowledge that gave deep information in the sense of security, it is a great help for readers who are in different fields other than information security. Bruce Schneier has very intimate knowledge about the topic of security. After reading the book we can find the vast information in different ways. The psychology of security is the chapter that is beautiful and meaningful and provides experimental information to the reader, Bruce relates the human mindset and human psychology with security as he tries to represent the similarity and difference with security and human psychology.…

    • 773 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Everyday money is stolen, sites are hacked, and governments seek to gain an advantage over the others by using the internet. It is as if there is a war going on behind the scenes of the internet. A new battlefield erupted in cyber-space. Cyber-warfare is what this called. In Cyber-Warfare not only are vital secrets compromised, but complex systems can be, and have been attacked that put peoples life in danger.…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Internet is not a safe place so that is why everyone is using virus protection software to protect their computer system and privacy. There is a lot of threats hiding in the network such as phishing website and viruses. This is why people and organisations should have some defending software that can find these threats and delete them before they do a big damage to the whole system. Organisation that are working with huge flow of data should protect their personal and important information with virus protection software. Malicious software can come together with emails and USB sticks, every single organisation have to be prepared on these circumstances and keep their type of anti-virus up to date to avoid any unexpected threat to the system and…

    • 1134 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Information Security Breach these days has been a popular subject in news. Almost every companies have been hacked, if not yet, they should not consider themselves as more secure than others that have already been there. In December 2013, Target was one of the victims with more than 40 million credit cards and debit cards that were stolen by malicious people. Just right before Thanksgiving a malware was installed inside target database.…

    • 1715 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Adware and spyware are programs that are included in email attachments, downloaded as part of another program or website. The capabilities of adware include adjustments to a computer browser, changing startup pages on the browser, replacing search functions, and generating pop-ups or frames that are difficult to delete or shut down. Spyware are programs that are used by publishers or programmers for marketing purposes which are unknown by the user. Spyware can provide information such as user’s computer hardware, software, browsing habits, and other information. Denial-of-Service and Blended Attacks are two damaging strategies used by individuals that employ malicious codes.…

    • 1682 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The internet’s expansion since its first communication between two computers back in 1969 has created many new opportunities for people across the globe. Modern day life relies on the usage of the internet, where it improves the lives of people by making it easier to communicate, speed up their work, and share with others. However, with great things comes great consequences. Although the internet helps expand people’s lives and experiences, how are they to protect such precious treasures? Back in 1989 Robert Morris created one of the first computer worms to spread; which in turn caused much of the internet to shut down.…

    • 2112 Words
    • 9 Pages
    Improved Essays