Nobody downloaded yet

Vulnerabilities of Networks and Internet - Essay Example

Comments (0) Cite this document
The paper presents a clear view of the issues involving computer network and its security. It tackles the basic networking structure and principle and the vulnerabilities behind it. The good practice of info- security in the preservation of data and its role in effective network management.
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
Vulnerabilities of Networks and Internet
Read TextPreview

Extract of sample
"Vulnerabilities of Networks and Internet"

Download file to see previous pages The various networking security strategies are discussed along with alternatives.
Computers unquestionably make a large part of human movement faster, safer, and more appealing. They generate new modes of work and play. They continually spawn new ideas and offer many social benefits, yet at the same time they present increased opportunities for social harm. Public say that the information revolution can be compared to the industrial revolution, it is equally valuable as the coming of print media and perhaps even more significant.
The dependence of the businesses, industries and economies in networking and the internet grew in quality decision making and implementation. The age information technology like any other development in our society brings good and evil. While our economy and businesses prosper through IT and other automation, high-tech crimes are also growing in numbers and sophistication. Prevention plays an important role in network security
Information security or info-security main goal is to keep information on a network safe and secured. The other elements of info-security are divided into three important parts that serve as the foundation for all information security effort. These are confidentiality, integrity, and availability1 (CIA).
The first goal is confidentiality; this is where data are being protected from unauthorized eyes or individuals. These data can be all information vital to the success of the company or may contribute to its downfall. Engineering plans for instance, financial information, business or marketing plans, and whatever secret data stored in a computer2.


The second but equally important in the preservation of data is integrity.
Integrity helps to ensure that original information or data remains unchanged and properly synchronized transversely in the system. This means that even people who are authorized within the system cannot change anything without proper consent or approval. A bank teller for instance is authorized to make changes in an account but they are not authorized to debit another persons account


Availability ensures that information saved is available to authorized users and can get access to it whenever necessary. Valid and secured information is nothing if you cannot get to it. This means information is just being kept from the bad guys while its often available to the right people.

1. Howlett, Tony, 2005, "Open Source Security Tools",
Practical Applications for Security, pages 4-12. Prentice Hall, ISBN 0-321-19443-8

2. Kent Stephen, Millett Lynette, 2003 "Who Goes There: Authentication Through the Lens of Privacy ", National Academic Press, Washington D.C.

1. Business Risk - Information Security Standpoint

Computer Crimes

Computer related crimes affect every computer user in businesses and homes3. The FBI in the United States recorded over 90% of U.S. companies are victim ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Vulnerabilities of Networks and Internet Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from
(Vulnerabilities of Networks and Internet Essay Example | Topics and Well Written Essays - 1500 Words)
“Vulnerabilities of Networks and Internet Essay Example | Topics and Well Written Essays - 1500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Cyber Security Vulnerabilities indicating to a vulnerability resides within the system that can be utilized for hackers to gain access and is known as exploit. Apart from this inherent risk resulting from inadequate coding practices, human element is also considered as a serious threat that is not limited to hardware, applications and interfaces that provides accessibility to information systems. In the same context, (Das, Kant, & Zhang,) The United States Computer Emergency Readiness Team (US-CERT) has published a “high level overview” document reflecting weaknesses foe control systems. Likewise, the published report includes wireless access point vulnerabilities, network access vulnerabilities,...
14 Pages(3500 words)Essay
Vulnerabilities of Organizational Networks and Internets
...?Running head: Vulnerabilities of Organizational Networks and Internets Vulnerabilities of Organizational Networks and Internets Introduction The IT (Information Technology) industry has the potential to explore new avenues for the production of new and advanced products but it has various loopholes and chances of its wrong usage is also high. The advancement in the field of computer programming, networks and internet have raised concerns about the risks associated with the IT security, vulnerability to viruses and misuse of its various functions and programs....
4 Pages(1000 words)Coursework
Network Vulnerabilities:
...NETWORK VULNERABILITIES Network Vulnerabilities Affiliation Introduction This paper presents an overview of some of the common network vulnerabilities. This research will summarize 10 common network vulnerabilities into a table. This table will be divided into three columns. First column represents name of vulnerability, second column offers the description of that vulnerability and last column outlines the solution for the issue. No Vulnerability Description Control 1 USB thumb drives USB data travel drives are one of the main reasons of compromising the network security. Most of people make use of them to copy their sensitive information from one system to another and use it in a wrong way. We can protect our system by changing... ...
2 Pages(500 words)Essay
The connection between Networks and the Internet
...The internet is an immense network of many different interconnected networks globally and it’s easily accessible to the public. These interlinked computers function by transmitting information through a unique type of packets switching which is generally known as the Internet protocol or IP. Q.6 Internet is the most essential technology of the modern world. It has not only made the modern society easier than before, but it as well plays a highly significant role in the prospect development. Researchers can get any information they require and anyone looking for other services such as games or any form of entertainment can easily get the...
2 Pages(500 words)Essay
...Full Paper Vulnerabilities Electronic mail is the most common way of communicating messages to the sender. However, there are many associated threats and vulnerabilities that may breach any one of the three security fundamentals i.e. confidentiality, integrity and availability. Accordingly, during transit, if the message is modified, integrity and confidentiality will be breached. Similarly, non-repudiation issues will also occur, if there is no Public Key Infrastructure (PKI) that is operated by separate third parties. Likewise, the PKI is associated with digital certificates issued from a corporate authority i.e. Certificate Authority (CA) and is considered to be the most efficient control in terms of...
2 Pages(500 words)Research Paper
...bits. In networking in a building, there are various reasons why a network may be established. One of the reasons may be for the purpose of communication and also there may be the aspect of resource sharing. In order to achieve this there are various components such as routers, gateway among others. All these are the devises that aid in the networking process. References Andrew S. Tanenbaum (2006), Computer Networks, Fourth Edition, Pearson Education Comer, Douglas (2000). Internetworking with TCP/IP:Principles, Protocols, and Architectures -- 4th ed.. Upper Saddle River, NJ: Prentice Hall. Cisco Systems, Inc., (2003, March 14). CCNA: network media...
1 Pages(250 words)Essay
Password Management Protocol vulnerabilities
...Password Management Protocol vulnerabilities By of the affiliation Department’s Paper’s Password is one thing that can prevent other users from accessing various accounts networks and what is very important all kinds of confidential information. Such information should be protected and passwords are quite good solution for the protecting it from the unauthorized access. However, hackers can find them and steal using some software. There are many, even in the Internet, software which can help even amateurs in this business to steal passwords. We will through the usage of one application that can show and copy passwords saved in the browser. Many users use autocompleting in their browser...
2 Pages(500 words)Essay
Common Software Vulnerabilities', Database Security, and Attacks on Networks discussion
...research for better encryption as hackers are also working day and night to break the internet safety. Reference Cherry, D. (2011). Securing SQL Server protecting your database from attackers. Burlington, MA: Syngress. Natan, R. (2012). Implementing database security and auditing a guide for DBAs, information security administrators and auditors. Burlington, MA: Elsevier Digital Press. Network Attacks There have been recent vulnerabilities around the cryptography around the security of the Transport Layer, TLS or formerly known as SSL. The attack is entirely practical for all UDP reliant variant DTLS. For a common TLS protocol, the hacker needs more complex parameters, and...
3 Pages(750 words)Essay
SQL Injection Vulnerabilities
...SQL Injection Vulnerabilities INTRODUCTION SQL injection is a of vulnerability that poses extremely high risks in the presentthreat landscape. The MITRE Common Weakness Enumeration (CWE) ranked SQL injection as first in the list of top 25 most dangerous software errors. Many high profile intrusions have demonstrated the exploitation of these vulnerabilities. Abundance of information exist on the prevention of SQL injection vulnerabilities; however, much of such information is always technically designed for the web application developers and not the general user community. This forms the basis of the article: to provide comprehensive guidance on the use of the open source...
5 Pages(1250 words)Research Paper
Threats And Vulnerabilities Analysis
...Threats And Vulnerabilities Analysis Figure showing Vulnerability Assessment Matrix   Object of Vulnerability   Physical Cyber Human / Social Enabling Infrastructure Attributes: Hardware (Data Storage, Input/Output, Clients, Servers), Network and Communications, Locality Software, Data, Information, Knowledge Staff, Command, Management, Policies, Procedures, Training, Authentication Ship, Building, Power, Water, Air, Environment Properties Leading to Vulnerabilities Design / Architecture Singularity         Uniqueness     inadequate security awareness   Centrality  Centralized network monitoring and control       Homogeneity standardized network architecture       Separability... ...
6 Pages(1500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Vulnerabilities of Networks and Internet for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us