Article Research

Submitted by: Submitted by

Views: 368

Words: 563

Pages: 3

Category: English Composition

Date Submitted: 11/10/2010 03:46 PM

Report This Essay

Article Search

Zachary Babineaux

University of Pheonix

Article Search

Network security threats for SMBs addresses the 10 biggest and most dangerous threats to a business’s network. While these have been and are currently the main security issues, it is important to realize hackers and criminals are becoming more effective at finding new ways to compromise networks and will continue to do so (Network Security Threats 2010).

     The 10 threats and their descriptions addressed are –

     Viruses and Worms – malware that inserts malicious code into documents and spreads

     Trojan Horses – malware that disguises itself as something innocent

     Spam – 70 to 84 percent of daily email

     Phishing – spam emails containing links to insecure web sites

     Packet Sniffers – capture personal data streams over networks

     Maliciously Coded Web Sites – used to steal passwords from unrequested sites

     Password Attacks – variety of techniques used to steal passwords

     Hardware Loss and Residual Data Fragments – stolen laptops contributing to identity theft

     Shared Computers – susceptible to viruses

     Zombie Computers and Botnets – infected with malware spammers use owners email address

     All of the security issues listed above can relate to the hospitality industry. Every computer that uses the internet has email, or stores information is susceptible to security issues. Hackers and spammers do not care what person or business they are attacking, they simply want access and to steal personal and professional information. Additionally, in many restaurants, hotels, and travel companies the computers are networked. This means that one user’s problems could affect everyone else. There could be malicious competitors or disgruntled former employees which could contribute to security breaches.

     This article is mainly about abuses of secured information.  Not only does it list the top 10 security issues, it describes each issue, gives...