StudentShare solutions
Triangle menu

Vulnerabilities of Networks and Internet - Essay Example

Nobody downloaded yet

Extract of sample
Vulnerabilities of Networks and Internet

The various networking security strategies are discussed along with alternatives.
Computers unquestionably make a large part of human movement faster, safer, and more appealing. They generate new modes of work and play. They continually spawn new ideas and offer many social benefits, yet at the same time they present increased opportunities for social harm. Public say that the information revolution can be compared to the industrial revolution, it is equally valuable as the coming of print media and perhaps even more significant.
The dependence of the businesses, industries and economies in networking and the internet grew in quality decision making and implementation. The age information technology like any other development in our society brings good and evil. While our economy and businesses prosper through IT and other automation, high-tech crimes are also growing in numbers and sophistication. Prevention plays an important role in network security
Information security or info-security main goal is to keep information on a network safe and secured. The other elements of info-security are divided into three important parts that serve as the foundation for all information security effort. These are confidentiality, integrity, and availability1 (CIA).
The first goal is confidentiality; this is where data are being protected from unauthorized eyes or individuals. These data can be all information vital to the success of the company or may contribute to its downfall. Engineering plans for instance, financial information, business or marketing plans, and whatever secret data stored in a computer2.


The second but equally important in the preservation of data is integrity.
Integrity helps to ensure that original information or data remains unchanged and properly synchronized transversely in the system. This means that even people who are authorized within the system cannot change anything without proper consent or approval. A bank teller for instance is authorized to make changes in an account but they are not authorized to debit another persons account


Availability ensures that information saved is available to authorized users and can get access to it whenever necessary. Valid and secured information is nothing if you cannot get to it. This means information is just being kept from the bad guys while its often available to the right people.

1. Howlett, Tony, 2005, "Open Source Security Tools",
Practical Applications for Security, pages 4-12. Prentice Hall, ISBN 0-321-19443-8

2. Kent Stephen, Millett Lynette, 2003 "Who Goes There: Authentication Through the Lens of Privacy ", National Academic Press, Washington D.C.

1. Business Risk - Information Security Standpoint

Computer Crimes

Computer related crimes affect every computer user in businesses and homes3. The FBI in the United States recorded over 90% of U.S. companies are victim ...Show more


The paper presents a clear view of the issues involving computer network and its security. It tackles the basic networking structure and principle and the vulnerabilities behind it. The good practice of info- security in the preservation of data and its role in effective network management.
Author : anastacio13
Vulnerabilities of Networks and Internet essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Vulnerabilities of Networks and Internet"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Computer networks
For this reason, it was designed in a simplest and lightest form. However, after global adoption of IP version 4 throughout the world, it motivated researchers to review and redesign it. IP version 6 is a new or updated version of the previous version i.e.
14 pages (3500 words) Essay
Wireless networks
Abstract As the attractiveness of wireless networks amplifies, wireless network security has grown to be debatable topic in the recent years. As organizations are relying more on high-speed wireless networks, security is a vital factor. Wireless security is a framework that emphasizes on prevention of workstations or networks from unauthorized access.
7 pages (1750 words) Essay
Cyber Security Vulnerabilities
NO matter how advanced the security controls are, still incidents and security breaches are on the rise. There are numerous cases where IT managers have failed to provide or define adequate security for enterprise wide infrastructure of an organization. Likewise, they emphasize more or external security threats rather than internal vulnerabilities.
14 pages (3500 words) Essay
Anonymity and Networks Essay
Three types of Internet anonymity include full anonymity and pseudonymity. Many internet anonymity systems have some flaws which allow eavesdroppers to access personal information. Internet anonymity is offered through anonymous servers and anonymous internet users.
9 pages (2250 words) Essay
Two Vulnerabilities That Have Been Discovered in the Past Two Years (BlackBerry, Cisco IOS Software)
The term ‘vulnerability’ can be referred as one of the rising issues in the computer security system. Vulnerability can be considered as a weakness which occurs due to the intersection of a system or threat through physically or by the network and it reduces the system’s capability of its information assurance.
6 pages (1500 words) Essay
Internet security
The figure is expected to double by 2016 and triple by 2025 (Schneider, 2000). Internet use has come to be embraced even from unlikely quarters with government adopting concepts such e-governance.
8 pages (2000 words) Essay
The connection between Networks and the Internet
e brought the world nearer, making lengthy remoteness shorter, permitting us to move to distant places faster and almost putting the entire globe at the palm. (LaQuey 34). In a technology framework, a network can be described as interconnection of digital machines capable of
2 pages (500 words) Essay
Password Management Protocol vulnerabilities
However, hackers can find them and steal using some software. There are many, even in the Internet, software which can help even amateurs in this business to steal passwords. We will through the usage of one application that can show and copy passwords saved in the browser.
2 pages (500 words) Essay
Common Software Vulnerabilities', Database Security, and Attacks on Networks discussion
For this reason, it could easily spread to the entire internet. Most of the UNIX computers uses Bash as the main software controlling its command prompt which could lead the bug to
3 pages (750 words) Essay
Vulnerabilities in Microsoft Windows Server, IAAS
Microsoft has developed wide array of servers over the years. Each of these servers has witnessed some form of vulnerability. The file sharing permission is a common form of vulnerability which Windows Server has been exposed to and it has resulted into multiple opportunities for hackers. Microsoft had restricted support to Windows Server 2003.
10 pages (2500 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment
Contact Us