StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Vulnerability of Computer Systems - Coursework Example

Cite this document
Summary
The paper "Vulnerability of Computer Systems" focuses on the critical analysis of the major issues in the vulnerability of computer systems. Vulnerability is a fault in a system that an attacker/hacker uses to reduce the security of the information in the system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Vulnerability of Computer Systems
Read Text Preview

Extract of sample "Vulnerability of Computer Systems"

Windows XP is vulnerable in HTTP services where an attacker who notices this flaw can win absolute control of the computer system and be able to manipulate the already installed programs and do any other thing to the system with full user rights.

Argument injection in packager.exe is another vulnerability of Windows XP. This allows an attacker to interfere with the system by using the (/), slash, character that makes the command before the slash is affected, which is the hackers’ command (Ren, 2010).

The common criterion is an internationally recognized set of standards that are used to successfully evaluate the security of a system like the operating system. It enhances the confidentiality of the user to a system as its certification is recognized globally and therefore all systems purchased throughout the world are subjected to the same level of security standards (Caplan, 1999).

The common criterion ensures that customers can trust the system they are purchasing or using in terms of confidentiality, availability, and integrity. Before a product is introduced to the market a vendor must submit the system for certification to an accredited testing laboratory. He has to specify the security target (ST) which describes an outline of the system, possible security threats, and how the security details will be implemented in the system. The testing laboratory then checks the product to verify its security for certification. The common criterion is hence a trustable method to ascertain the security of a system (Elof, 2003).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Coursework Example | Topics and Well Written Essays - 250 words - 3”, n.d.)
Cybersecurity Coursework Example | Topics and Well Written Essays - 250 words - 3. Retrieved from https://studentshare.org/information-technology/1591935-cybersecurity
(Cybersecurity Coursework Example | Topics and Well Written Essays - 250 Words - 3)
Cybersecurity Coursework Example | Topics and Well Written Essays - 250 Words - 3. https://studentshare.org/information-technology/1591935-cybersecurity.
“Cybersecurity Coursework Example | Topics and Well Written Essays - 250 Words - 3”, n.d. https://studentshare.org/information-technology/1591935-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Vulnerability of Computer Systems

The Impact and the Vulnerability of the Stuxnet Worm

The paper 'The Impact and the vulnerability of the Stuxnet Worm' presents the Stuxnet worm which is believed to be an extremely complicated and sophisticated computer worm, which was initially exposed in June 2010.... his paper discusses the impact and vulnerability of the SCADA/Stuxnet Worm in the critical infrastructure of the United States.... In this scenario, Stuxnet infects PLCs by weakening the Step-7 software system employed to reprogram these systems (O'Murchu, 2012; Keizer, 2009; John, 2010; Masood, Um-e-Ghazia, & Anwar, 2011)....
6 Pages (1500 words) Case Study

Vulnerability Assessment Systems

This essay "Vulnerability Assessment systems" focuses on security scanning tools that assess the level of threat that can penetrate a system.... Intrusion detection systems automatically raise the alarm in case of a security breach and inform the Computer Incident Respond Team for their help.... 'By analyzing the information generated by the systems being guarded, IDSs help determine if necessary safeguards are in place and are protecting the system as intended'....
11 Pages (2750 words) Essay

Vulnerability

Since nations' resources are nowadays directly or indirectly controlled by computer systems which are then interconnected with a complex network of interdependence hence the unprecedented levels of vulnerability and infrastructural risk through compromise of those computers, cyber-terrorism has emerged as a real world concern (Lewis, 2006).... Another example in 2003 was that of a ‘'Slammer'' attack which occurred when the ‘'Slammer'' worm was released for five hours to corrupt the computer control systems which was at the Davis-Besse nuclear power plant in Ohio....
1 Pages (250 words) Admission/Application Essay

Computer Crimes and their Avoidance

Nevertheless, hacking is helpful in determining the Vulnerability of Computer Systems in a network or in respect of an individual PC.... acking is a very common computer crime, in which hackers control computer systems in a network and operate them for their own illegal purposes.... Such attacks enable their perpetrator to determine the scope for clandestinely programming computer systems and their consequent exploitation.... Some individuals employ hacking attacks to gain access to computers maintained by corporations or the government, so as to reveal the openness of the security systems and to prove their ability to access highly protected computer networks....
7 Pages (1750 words) Report

Vulnerability in the Communication System

In addition to that, when attackers hack into the organization's systems and access PDF files, they may steal vital data from the body.... This case study "vulnerability in the Communication System" focuses on the problem that the system run by the organization does not have necessary checks against information stored in PDF format because the company uses Adobe Reader and the Adobe Acrobat to access PDF files.... he CVE- 2014- 0567 is a vulnerability in the Adobe Reader Application and the Adobe Acrobat....
6 Pages (1500 words) Case Study

Amazons Elastic Compute Cloud Service

This paper outlines systems, designs, innovations, the reason for choosing Amazon EC2 Services, the evaluation of innovation, and design issues of Amazon EC2 Service.... This includes the developments of the elastic computer cloud (EC2) as a solution to the virtual private cloud.... This paper will explore and critically evaluate Amazon's electric computer cloud that would give valuable information for computing firms.... he elastic computer cloud is a service based on the infrastructure of the cloud provider that enables people to rent hourly instances (virtual servers) to carry out computing activities....
8 Pages (2000 words) Case Study

Risk Analysis of the InSycure Computer System

Information systems and hardware need to be secured from threats within and outside the enterprise.... In this case, identification and prioritization of the information systems assets, an association of the identified risks with the company's assets as well as a listing of the relevant controls that could be effectively applied to mitigate the identified risks has been greatly focused on (Jopeck, 2000).... From the above table, it is quite clear that Authentication and Authorization services, Environmental servers and DNS name servers, Network –modems, servers, routers, and Network Intrusion Detection systems are more critical compared to Client systems and Accounting systems....
8 Pages (2000 words) Assignment

Principles of Computer System Design: Security

As the paper "Principles of computer System Design: Security" tells, the Thompsons' rigged compiler is a deadly attack that is almost impossible to detect.... Since it is not possible for Unix developers to inspect code in a production environment, inspecting the compiler code for the login program will not resolve the issue since the back door will continue appearing in future codes that the infected computer generates....
6 Pages (1500 words) Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us