Computer Ethics

Submitted by: Submitted by

Views: 235

Words: 704

Pages: 3

Category: Business and Industry

Date Submitted: 02/15/2013 04:39 PM

Report This Essay

COMMON COMPUTER NETWORK THREATS and VULNERABILITIES

CIS 324 COMPUTER ETHICS

Abstract

In computer, an attack is any effort to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. An attack usually is perpetrated by someone with bad intentions. A Threat is a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could violate security and cause harm.

When we talk about Network Threats, we must talk about the first stage and that is hardening your network. Hardening means reducing or mitigating weakness, securing services, and attempting to make your network immune to attacks.

Network threats have many facets on your network. We all have seen over time, that your systems and information are susceptible to attacks and disruption based on internal, external, and design factors in the system that you work on. The little things that everyone can do to reduce the risk is making sure the applications and your system are kept up-to-date can eliminate a lot of these threats. Here are some examples of exploitation attacks that occur to programs, Outlook, Outlook Express, and Exchange. Another way to reduce the risk to Common Threats are making sure as System Administrator, you apply fixes and apply patches at the appropriate websites or repositories. This will make it harder for attackers to learn about your system and exploit known weaknesses.

Common Network Threats

1. Stolen credentials: This serves as an entry point for attackers.

2. Malware/Virus/Worms: This is primarily used on Window systems.

3. Rootkits/Trojans: Software that uses different techniques in order to open (and hide) a backdoor in a host/service.

4. Phishing/Spam: Good one here, this is the topic that we have just discussed in week 5. Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup. There are different...