Vulnerabilities In Computer Security

1094 Words 4 Pages
As with the advances in computer technology, it appears that the world is experiencing a breakthrough with the massive explosion of computer usage has brought so many modern amenities to make our life easier although it raises a question about vulnerabilities in the computer infrastructure. As the matter of fact, today’s modern lives tend to rely on computers to reach a quest where machines are assigned to reduce human effort. Computer hacking is defined as a threat, which poses to security as the practice of modifying the features of computer system. The issues arising from the computer security have drawn satisfactory attention to look for a way of solution to approach the problem in recent year. This essay will outline the difficulties …show more content…
In addition to, it’s a potential threat for users who experience a malicious attack to make network resource unavailable by sending just a single packet to the system. It’s a specific type of attack that exploits vulnerabilities in network. Most hacker tend to break down the network system to extract the confidential information without having permission to access. The vulnerabilities found in network is due to following reasons. First, routers which share infrastructure can be affected by denial-of-service attack. Second, routers which are used at the core of the network can be affected by modifying the behaviour of router to launch denial-of-service attack. One example is massive distributed denial-of-service attacks generated by BOTNETS which is triggered to manipulate the system without user’s knowledge. ‘The attack is triggered with a single packet, absorbs all bandwidth of the outgoing link on the router, and can propagate to all vulnerable downstream routers’(Chaski, D,Wu, Q and Qolf, T 2011,pp-2). It appears that vulnerability exploited in router leads to absorbing all the bandwidth to disrupt the operation of the router so that can bring the entire network to its …show more content…
Most, if not all, computers can be inflicted by Malicious software (Malware) are hard to fix an infection found in the system. It can lead to hacking, leaking of valuable information and a vulnerable threat to security. It requires no intervention to propagate across computer networks like the flu shot. Moreover, there are many types of malware like Trojan horses, viruses, worms, rootkits, spyware which penetrates specific application to deteriorate the system thus stealing confidential data from computer. As a consequence, these malware propagates through computer hardware gradually and pave a new way to penetrate operating system. According to Ruanthala (CURIE, 2010, volume-3,p-42) states that Blended threats made up 54 percent of the top 10 malicious code submissions over the last six months of 2003. Undoubtedly, the most common channel it uses to propagate is the internet, which is regulated by automatic process compromising a host from across the internet. Until anyone suspect that the system is being manipulated, it remains unnoticed, which may crash the system

Related Documents