Vulnerabilities In Computer Security

Superior Essays
As with the advances in computer technology, it appears that the world is experiencing a breakthrough with the massive explosion of computer usage has brought so many modern amenities to make our life easier although it raises a question about vulnerabilities in the computer infrastructure. As the matter of fact, today’s modern lives tend to rely on computers to reach a quest where machines are assigned to reduce human effort. Computer hacking is defined as a threat, which poses to security as the practice of modifying the features of computer system. The issues arising from the computer security have drawn satisfactory attention to look for a way of solution to approach the problem in recent year. This essay will outline the difficulties …show more content…
In addition to, it’s a potential threat for users who experience a malicious attack to make network resource unavailable by sending just a single packet to the system. It’s a specific type of attack that exploits vulnerabilities in network. Most hacker tend to break down the network system to extract the confidential information without having permission to access. The vulnerabilities found in network is due to following reasons. First, routers which share infrastructure can be affected by denial-of-service attack. Second, routers which are used at the core of the network can be affected by modifying the behaviour of router to launch denial-of-service attack. One example is massive distributed denial-of-service attacks generated by BOTNETS which is triggered to manipulate the system without user’s knowledge. ‘The attack is triggered with a single packet, absorbs all bandwidth of the outgoing link on the router, and can propagate to all vulnerable downstream routers’(Chaski, D,Wu, Q and Qolf, T 2011,pp-2). It appears that vulnerability exploited in router leads to absorbing all the bandwidth to disrupt the operation of the router so that can bring the entire network to its …show more content…
Most, if not all, computers can be inflicted by Malicious software (Malware) are hard to fix an infection found in the system. It can lead to hacking, leaking of valuable information and a vulnerable threat to security. It requires no intervention to propagate across computer networks like the flu shot. Moreover, there are many types of malware like Trojan horses, viruses, worms, rootkits, spyware which penetrates specific application to deteriorate the system thus stealing confidential data from computer. As a consequence, these malware propagates through computer hardware gradually and pave a new way to penetrate operating system. According to Ruanthala (CURIE, 2010, volume-3,p-42) states that Blended threats made up 54 percent of the top 10 malicious code submissions over the last six months of 2003. Undoubtedly, the most common channel it uses to propagate is the internet, which is regulated by automatic process compromising a host from across the internet. Until anyone suspect that the system is being manipulated, it remains unnoticed, which may crash the system

Related Documents

  • Improved Essays

    Managing Threats to Data Common threats to data consist of Botnets, DDoS (Distributed denial of service), Hacking, etc. You can manage and prevent data threats with antivirus/malware/hacking/etc software. By downloading a legitimate program you can protect your computers data. The software will alert you if there is something out of place in your computer before it’s too late, so you can get it removed.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Great Essays

    Technical Paper – Honeypot IT-548-Q1088 Information Security Submitted by Anudeep Gali Professor: Dr. Derek Holbert Southern New Hampshire University Abstract: Internet is one of the useful resources to the mankind but on the other hand possess so many threats and provides a means of attack for the Intruders. In this project we will be building a secure shell Honeypot and deploy on a public server to research the cyber attacks. Once we deploy the system, we will concentrate on recording all the attempts made by the intruder to enter the information system. We will be able to analyze the most commonly used usernames and passwords and analyze the shell commands used by the intruders to develop remedies of attacks on the original…

    • 1226 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    1. Internal Bot If an attacker is attempting to breach the enterprise, they may attempt to insert a bot within the network which will wreak havoc on the organization’s system. The internal bot addresses security at the perimeter of the enterprise. The DPI (deep packet inspection) engine will identify network malware that’s attempting to penetrate the network.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Numerous virus contain a load designed to damage the system’s data, while others only spread without causing direct damage to their hosts. Computer viruses are similar to natural viruses in the way they multiply in number and in the way they need a host to survive.…

    • 1458 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    However, with every advancement comes the criminal exploits of vulnerabilities. This criminal element help create the notion of “policing” cyberspace, which enviably lead to the development of new tactics and techniques to secure…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    College Security Risks

    • 1018 Words
    • 5 Pages

    The malware threats that I saw on the campus systems stunned me when I ran an anti-virus protection…

    • 1018 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    It’s great that each day technology is taking new phases and flourishing its potentiality, but the advancing field is also becoming a growing opportunity for invaders to breach security. By the time you recognize the attack, damage is already done, leaving you with nothing but an infected system. To prevent potential data injury, you need to be quick and proactive. Here are few steps that can help offset the deadly…

    • 409 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Having researched cybercrime and technology use among criminal populations for more than a decade, I know that both types of miscreants want to find ways into secure places – computers and networks, and homes and businesses. They have a range of options for how to get in. Software development is not a perfect process, and neither are people. We need to learn to recognize signs of hacks. Take suspicious emails for example; hackers often send…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Win32 Zlob Research Paper

    • 326 Words
    • 2 Pages

    It gets into your system via spam mails or unauthorized programs and websites. Once it gets into your system, it starts attracting other similar type of viruses and malware and then all these viruses launch a collective attack on the system, virtually turning…

    • 326 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    A denial of service attack is a push to make one or more PC frameworks inaccessible. It is normally focused at web servers, however it can likewise be utilized on mail servers, name servers, and some other sort of PC framework. Denial of service attack (DoS) attacks may be started from a solitary machine, yet they normally utilize numerous PCs to do an attacks. Since most servers have firewalls and other security programming introduced, it is anything but difficult to bolt out individual frameworks. In this way, circulated denial of service attack (DDoS) attacks are frequently used to organize various frameworks in a concurrent attacks.…

    • 364 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Carry On is a good source of knowledge that gave deep information in the sense of security, it is a great help for readers who are in different fields other than information security. Bruce Schneier has very intimate knowledge about the topic of security. After reading the book we can find the vast information in different ways. The psychology of security is the chapter that is beautiful and meaningful and provides experimental information to the reader, Bruce relates the human mindset and human psychology with security as he tries to represent the similarity and difference with security and human psychology.…

    • 773 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Everyday money is stolen, sites are hacked, and governments seek to gain an advantage over the others by using the internet. It is as if there is a war going on behind the scenes of the internet. A new battlefield erupted in cyber-space. Cyber-warfare is what this called. In Cyber-Warfare not only are vital secrets compromised, but complex systems can be, and have been attacked that put peoples life in danger.…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Internet is not a safe place so that is why everyone is using virus protection software to protect their computer system and privacy. There is a lot of threats hiding in the network such as phishing website and viruses. This is why people and organisations should have some defending software that can find these threats and delete them before they do a big damage to the whole system. Organisation that are working with huge flow of data should protect their personal and important information with virus protection software. Malicious software can come together with emails and USB sticks, every single organisation have to be prepared on these circumstances and keep their type of anti-virus up to date to avoid any unexpected threat to the system and…

    • 1134 Words
    • 5 Pages
    Improved Essays