Network Vulnerabilities And Controls Essay

PAGES
4
WORDS
1304
Cite

Network Vulnerabilities and Controls Computer networks are constantly under threat from many different sources of attacks. In order to get a clear understanding of the different views on computer security and its characteristics, it is important to define a network. This term means a group of computers that have been interconnected to communicate to one another using electrical signals. The network can be either wired or wireless and the most common of them nowadays is the wireless computer network. The internet or wide area network can link very many computers that are widely and geographically apart.

Computers are therefore linked to communicate with one another via the internet. However, these same computers are prone to attacks from all different angles. Any unauthorized access to ones computer can be defined as an attack since in the process, valuable information may be retrieved from the computer or even deleted. The information may be defined as an asset by many scholars and bodies with the international standards organization (2009) defining an attack on the computer which is the asset as any "attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset."

These attacks can either come from within or from outside an organization via the internet. Some of the threats that computer systems are vulnerable to range from viruses, spyware, malware, viruses, inception of data identity theft and hacker attacks (cisco.com). In this paper the focus will mainly be on hackers and how they operate.

Hackers defined

Bruce sterling (1993) defined a hacker as "a person who breaks into computers and computer networks for profit, as protest, or sometimes by the motivation of the challenge." Although they term themselves as computer experts, many countries businesses and individuals see the specified hackers as criminals. Some are good others are bad but they all depend on the vulnerability of the computer network to carry out their...

...

They all have to get around a system in order to gain access to it. Vulnerability of the computer systems is the rating of the level of insecurity of the said systems and therefore leading to exposure to very big risks.
Hackers use various methods to exploit the weaknesses of the network systems. A weak system will always be prone cyber attacks therefore it is necessary to explore all the possible vulnerabilities of the system. In 2009 the Juniper networks inc. published a paper on "Nuclear Plant Control System Cyber Vulnerabilities and Recommendations toward securing them." They suggested that hackers are motivated by many things including money in order to make a quick buck out of the exploitation of the systems weakness. It is true that a cyber attack can cripple a fully operational plant bringing it to its knees. Any computerized system can be hacked if it is found to be lacking the proper security control measures. Attacks can be on the aviation industry, power generation plants, satellites and many more.

Data interception is the most common threat to the internet since the data that has been intercepted can be used for other harmful means, this occurs when there is a weak link in the network and this is what intruders exploit to achieve their objective. As was in the case of 1999 where a direct threat to the U.S. power stations was witnessed where a computer hacker "publicly announced his intention to release a report outlining how to break into power company networks and shut down the power grids of 30 United States utility companies" (utilities it, 2000). Probably the hacker may have intercepted data that was being transmitted to the different power companies through their systems therefore making them highly susceptible to attacks.

Hackers rely mostly on the information gathered from the internet due to the public availability of the data. The internet has got a lot of information about companies and public utilities you name it, just a quick search in a search engine and…

Sources Used in Documents:

References

ISO, (2009). International standards. Geneva Switzerland. Retrieved from. http://www.iso.org/iso/iec27000

Cisco, (2011).Cisco Security Advisory: Cisco Network Admission Control Guest Server System Software Authentication Bypass Vulnerability. Retrieved from http://www.cisco.com/warp / public/707

Juniper networks inc. (2009).Nuclear plant control system cyber vulnerabilities and recommendations toward securing them: Enabling comprehensive network- based security for control systems

May P., et al. (2006), mitigations for security vulnerabilities found in control system networks, Retrieved in 2006, from http://www.isa.org. 3-9


Cite this Document:

"Network Vulnerabilities And Controls" (2011, June 04) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/network-vulnerabilities-and-controls-118632

"Network Vulnerabilities And Controls" 04 June 2011. Web.25 April. 2024. <
https://www.paperdue.com/essay/network-vulnerabilities-and-controls-118632>

"Network Vulnerabilities And Controls", 04 June 2011, Accessed.25 April. 2024,
https://www.paperdue.com/essay/network-vulnerabilities-and-controls-118632

Related Documents

In this manner, it makes network management and filtering a lot easier. Even though SPF can protect the network infrastructure against certain attacks that are known to exploit the weaknesses that are inherent in the various network level protocols, it can never provide protection at application level. The application defense needs more awareness of the content of the payload. Circuit Proxy Firewall (CPF) This type of firewall operates by relying as

Network Plan for ABC Corp
PAGES 9 WORDS 2595

The paper creates Extended Access Control Lists for ABC Corporation using Port Numbers. Extended Access Control Lists for ABC Corporation using Port Numbers access-list 101 permit tcp 172.16.3.0. 0.0.0.255 any eq 20 access-list 101 permit tcp 172.16.5.0. 0.0.0.255 any eq 21 access-list 101 permit tcp 172.16.3.1/16. 0.0.0.255 any eq 22 access-list 101 permit tcp 172.16.3.254/16. 0.0.0.255 any eq 25 access-list 101 permit tcp 172.16.5.254/16. 0.0.0.255 any eq 35 access-list 101 permit tcp 172.16.0.254/16. 0.0.0.255 any eq18 access-list 101

Network Design Network ABC NETWORK DESIGN A Comprehensive Proposal and Design for ABC Inc. Network Requirements Network Proposal Overview Telecommunication Overview Telecommunication Proposal Network Configuration Management Plan In order to meet the needs of the customers, ABC Inc. must insure that productivity is not hindered by the growth of the company. The employees at ABC Inc. must have a robust network so that customer service is not jeopardized. The accounting firm has grown from five to fifty employees

Network Security
PAGES 4 WORDS 1437

Network Security for a Medium Sized Company: Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The

Network Security
PAGES 10 WORDS 3307

Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model

The behavior of both botnets and worms in peer-to-peer networks have been empirically examined and models or simulations of their behavior have been attempted, and the manner in which different nodes in peer-to-peer networks develop in and of themselves and in terms of their relationships with other nodes -- the very architecture of the network itself, in other words, which is necessarily dynamic in a peer-to-peer network -- makes