Vulnerabilities In Computer Security

Better Essays
As with the advances in computer technology, it appears that the world is experiencing a breakthrough with the massive explosion of computer usage has brought so many modern amenities to make our life easier although it raises a question about vulnerabilities in the computer infrastructure. As the matter of fact, today’s modern lives tend to rely on computers to reach a quest where machines are assigned to reduce human effort. Computer hacking is defined as a threat, which poses to security as the practice of modifying the features of computer system. The issues arising from the computer security have drawn satisfactory attention to look for a way of solution to approach the problem in recent year. This essay will outline the difficulties …show more content…
In addition to, it’s a potential threat for users who experience a malicious attack to make network resource unavailable by sending just a single packet to the system. It’s a specific type of attack that exploits vulnerabilities in network. Most hacker tend to break down the network system to extract the confidential information without having permission to access. The vulnerabilities found in network is due to following reasons. First, routers which share infrastructure can be affected by denial-of-service attack. Second, routers which are used at the core of the network can be affected by modifying the behaviour of router to launch denial-of-service attack. One example is massive distributed denial-of-service attacks generated by BOTNETS which is triggered to manipulate the system without user’s knowledge. ‘The attack is triggered with a single packet, absorbs all bandwidth of the outgoing link on the router, and can propagate to all vulnerable downstream routers’(Chaski, D,Wu, Q and Qolf, T 2011,pp-2). It appears that vulnerability exploited in router leads to absorbing all the bandwidth to disrupt the operation of the router so that can bring the entire network to its …show more content…
Most, if not all, computers can be inflicted by Malicious software (Malware) are hard to fix an infection found in the system. It can lead to hacking, leaking of valuable information and a vulnerable threat to security. It requires no intervention to propagate across computer networks like the flu shot. Moreover, there are many types of malware like Trojan horses, viruses, worms, rootkits, spyware which penetrates specific application to deteriorate the system thus stealing confidential data from computer. As a consequence, these malware propagates through computer hardware gradually and pave a new way to penetrate operating system. According to Ruanthala (CURIE, 2010, volume-3,p-42) states that Blended threats made up 54 percent of the top 10 malicious code submissions over the last six months of 2003. Undoubtedly, the most common channel it uses to propagate is the internet, which is regulated by automatic process compromising a host from across the internet. Until anyone suspect that the system is being manipulated, it remains unnoticed, which may crash the system

Related Documents

  • Decent Essays

    and how to protect from it ?. More susceptible to this malware who browser suspicious sites which mean some sites are already get hacked from hackers and the hackers have hidden ransomware. To be more safe , users and employments should not visit a susceptible sites and if they need to visit make sure that browser is updated and do not download any execution file. As I mentioned the common attack method of ransomware. So we can always have seen that attack come in after the victim accept which mean the attacker convince the victim to open the link or the execution file.…

    • 1452 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    It is considered to be one of the more dangerous forms of Malware, due to its inability to replicate and its difficult classification as a virus. Another reason that it is considered to be one of the more dangerous forms of Malware is due to the fact that it is secretive and unsuspecting. The attachment appears to the user’s email account or server as a harmless attachment. Once the user opens the attachment, the software is downloaded and all of the personal information that is stored on the computer is now in the hacker’s…

    • 1143 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    1) What is the difference between a virus and other types of malicious code? A virus is a particular type of malicious program designed to duplicate itself and spread from system to system. Normally, viruses attach themselves to files that can be shared enabling the malicious code to access to new computers. Viruses that are more complex may take over your email client, mailing copies of themselves to the contacts for a faster, more effective transmission (Fritsch et al, 2015). Numerous virus contain a load designed to damage the system’s data, while others only spread without causing direct damage to their hosts.…

    • 1458 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    To make clear what a security attack is, it is a “A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect, disrupt, deny, degrade or destroy information system resources or the information itself” (Gallagher). These attacks can come in any shape or form over the internet and with the little regulation over cyber threats internationally it needs to be a constant cause for alarm for agents. Verizon showed its 2013 data breach investigation report that 95 percent of the advance attacks came through emails that were containing malicious attachments which gave the attackers a a stepping stone into the host networks computers and network devises which then exposed the valuable and/or private…

    • 802 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Types of Cyber Crime 2.1 Hacking: This type of crime is very dangerous and punishable as it refers to the breaking down into the computer system so that one’s valuable data can be accessed easily without any permission in hacking criminal uses different software to enter a person’s computer and a person may not be aware of that his system is being used from another…

    • 1830 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Abstract- Modern technological advancement made our current internet on the pinnacle of everything related to information technology. However, it is always threatened by various types of security issues, which are mostly due to hackers, their bots and malicious scripts. They attacks, corrupts, collects and destroys the essential information in the system of the valuable organizations. To stop their such harmful and hazardous activities or to take preventive measures, most organizations now started to keep their own hackers who are known as ethical hackers or white hat hackers. This paper is based on what exactly an ethical hacker does, his protective system from illegal trespassing and on the field of ethical hacking with its various aspects.…

    • 1032 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    People found guilty of the crime can be penalized strictly. It is a fact that one usually does a lot of downloading from different websites, thus a pirate is very susceptible to downloading a Trojan or spyware .If he is caught, and the company decides to press charges, this can lead to stiff fines and prison time. It is like you are taking the product of another person without prior permission or payment to the owner. Risky: Pirated software can be easily infected with serious computer viruses, which can damage the user's computer system. If we acquire a fake software, and it suddenly crashes, we will not be able to complain about the defective purchase as it's fake.…

    • 2800 Words
    • 12 Pages
    Decent Essays
  • Decent Essays

    Denial-of-Service and Blended Attacks are two damaging strategies used by individuals that employ malicious codes. A DoS attack is an attempt to make a site or Web site unavailable to its intended users, such as temporarily or indefinitely interrupt or suspend services to the Internet. Multiple bogus requests are sent to the server resulting in overloading the server and preventing legitimate usage (Taylor et al., 2011). A blended attack is an attack that involves a combination of attacks using worms, Trojan horse, virus, and other types of malware. The blended attack utilizes multiple payloads and targets that make up the virus programming (Taylor et al.,…

    • 1682 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    However, the hackers are always a step ahead of us. Is there a way to stop the hackers? Cybersecurity, as known as Computer Security, is the “method of protecting information, computer programs, and other computer system assets (“Computer Security”).” However, today is not only computers. According to my friend, Alex Cormier, who works at MassMutual in their IT department, all electronics are vulnerable to attacks. “Anything that can connect to the Internet can be vulnerable to certain exploits, and that could end up helping someone get into a network or system and cause much data loss, as well as disruption of services that are provided by the group being affected the by ‘hacker’ (Cormier)”.…

    • 1115 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    This is the called malicious advertising. They use software vulnerabilities in the system, implanted in the system to steal account passwords, bank information and personal data of. Ad networks are complex and it is difficult to detect and track. Ads may be based on location, time, preferences. Most ad platforms do not have the ability to verify that an ad is safe.…

    • 1807 Words
    • 8 Pages
    Decent Essays