Verified Document

Network Vulnerabilities And Controls Essay

Network Vulnerabilities and Controls Computer networks are constantly under threat from many different sources of attacks. In order to get a clear understanding of the different views on computer security and its characteristics, it is important to define a network. This term means a group of computers that have been interconnected to communicate to one another using electrical signals. The network can be either wired or wireless and the most common of them nowadays is the wireless computer network. The internet or wide area network can link very many computers that are widely and geographically apart.

Computers are therefore linked to communicate with one another via the internet. However, these same computers are prone to attacks from all different angles. Any unauthorized access to ones computer can be defined as an attack since in the process, valuable information may be retrieved from the computer or even deleted. The information may be defined as an asset by many scholars and bodies with the international standards organization (2009) defining an attack on the computer which is the asset as any "attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset."

These attacks can either come from within or from outside an organization via the internet. Some of the threats that computer systems are vulnerable to range from viruses, spyware, malware, viruses, inception of data identity theft and hacker attacks (cisco.com). In this paper the focus will mainly be on hackers and how they operate.

Hackers defined

Bruce sterling (1993) defined a hacker as "a person who breaks into computers and computer networks for profit, as protest, or sometimes by the motivation of the challenge." Although they term themselves as computer experts, many countries businesses and individuals see the specified hackers as criminals. Some are good others are bad but they all depend on the vulnerability of the computer network to carry out their...

They all have to get around a system in order to gain access to it. Vulnerability of the computer systems is the rating of the level of insecurity of the said systems and therefore leading to exposure to very big risks.
Hackers use various methods to exploit the weaknesses of the network systems. A weak system will always be prone cyber attacks therefore it is necessary to explore all the possible vulnerabilities of the system. In 2009 the Juniper networks inc. published a paper on "Nuclear Plant Control System Cyber Vulnerabilities and Recommendations toward securing them." They suggested that hackers are motivated by many things including money in order to make a quick buck out of the exploitation of the systems weakness. It is true that a cyber attack can cripple a fully operational plant bringing it to its knees. Any computerized system can be hacked if it is found to be lacking the proper security control measures. Attacks can be on the aviation industry, power generation plants, satellites and many more.

Data interception is the most common threat to the internet since the data that has been intercepted can be used for other harmful means, this occurs when there is a weak link in the network and this is what intruders exploit to achieve their objective. As was in the case of 1999 where a direct threat to the U.S. power stations was witnessed where a computer hacker "publicly announced his intention to release a report outlining how to break into power company networks and shut down the power grids of 30 United States utility companies" (utilities it, 2000). Probably the hacker may have intercepted data that was being transmitted to the different power companies through their systems therefore making them highly susceptible to attacks.

Hackers rely mostly on the information gathered from the internet due to the public availability of the data. The internet has got a lot of information about companies and public utilities you name it, just a quick search in a search engine and…

Sources used in this document:
References

ISO, (2009). International standards. Geneva Switzerland. Retrieved from. http://www.iso.org/iso/iec27000

Cisco, (2011).Cisco Security Advisory: Cisco Network Admission Control Guest Server System Software Authentication Bypass Vulnerability. Retrieved from http://www.cisco.com/warp / public/707

Juniper networks inc. (2009).Nuclear plant control system cyber vulnerabilities and recommendations toward securing them: Enabling comprehensive network- based security for control systems

May P., et al. (2006), mitigations for security vulnerabilities found in control system networks, Retrieved in 2006, from http://www.isa.org. 3-9
Cite this Document:
Copy Bibliography Citation

Related Documents

Network Design Network ABC Network Design a
Words: 3772 Length: 12 Document Type: Essay

Network Design Network ABC NETWORK DESIGN A Comprehensive Proposal and Design for ABC Inc. Network Requirements Network Proposal Overview Telecommunication Overview Telecommunication Proposal Network Configuration Management Plan In order to meet the needs of the customers, ABC Inc. must insure that productivity is not hindered by the growth of the company. The employees at ABC Inc. must have a robust network so that customer service is not jeopardized. The accounting firm has grown from five to fifty employees

Cyber Security Vulnerabilities in Space Vehicles
Words: 4220 Length: 14 Document Type: Dissertation or Thesis complete

Cyber Security Vulnerabilities in Space Vehicles Cyber Security VulnerabilitiesAbstract 1Introduction 3Background 4Overview of Space systems 4The developing threat in Cyberspace 5Space Vehicles attack surface 6Cyber Security Vulnerabilities in Current Space Systems 6Advanced Persistent Threats 7Improperly secured ground facilities 11Space Segments Vulnerabilities 12Small Satellites Vulnerabilities 12Current Cyber Security Mitigation Techniques 13Conclusion 16AbstractThe advancement of innovations, views, and funding alters the outer milieu by making it more accessible to many individuals. The

Design Telecommunications Network
Words: 1248 Length: 3 Document Type: Essay

Telecommunications Network In an effort to provide better care for its patients, arises the need to design a network able to support a new multi-location dental care practice. In this report, we will provide a clear set of requirements for the network solution, and then identify the information that is to be protected as well as their related security requirements. Also, we will identify the types of network components, devices

Unix/Linux Systems Vulnerabilities and Controls
Words: 1233 Length: 4 Document Type: Essay

6.30. When there are no restrictions for unprivileged users and if the option for config_rdskernel configuration is set, hackers can write arbitrary values into kernel memory (by making specific types of socket function calls) since kernel software has not authenticated that the user address is actually found in the user segment. The lack of verification of the user address can provide hackers to gain privileges and access to areas that

Software Applications: Vulnerabilities and Controls
Words: 1237 Length: 4 Document Type: Essay

All of these tools make it possible for a hacker to not only corrupt the application itself in terms of accessing confidential information, but further allow for the hacker to spread damage deep into the application to attack other systems, essentially able to shut down an entire application with the corruption of contained information. Though some of the aforementioned tactics involve the physical infiltration of a company in order to

Security Program Network Risk Assessment
Words: 1927 Length: 7 Document Type: Term Paper

Tracking normal activity patterns of users is essential to enable abnormal activity to be flagged. Also, unintentional user errors such as logging onto unsecure websites and opening up potentially infected documents must be flagged. Sending an email from an odd-looking address and seeing if employees open the email is one way to gage the relative wariness of employees. If employees open up the email, it staff can include a

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now