You are on page 1of 1

1 Network Security

a, Security Threats and Vulnerabilities

Computer networks are essential to everyday activities. Individuals and organizations depend on
their computers and networks.

An intrusion by an unauthorized person can result in costly network outages and loss of work.

Attacks on a network can be devastating and can result in a loss of time and money.

Intruders can gain access to a network through software vulnerabilities, hardware attacks, or
something as simple as password guessing – these intruders are called hackers.
 Four types of threats might occur:
 Information Theft – Occurs when someone breaks into a computer for the purpose
of stealing confidential information.
 Data Loss and Manipulation – This is breaking into a computer to destroy or
alter data records.  An example of data loss: a virus that reformats a person’s hard
drive.  An example of data manipulation: breaking into a system to change the price
of an item.
 Identity Theft – This is a form of information theft where personal information is
stolen for the purpose of stealing someone’s identity.
 Disruption of Service – This is preventing legitimate users from accessing
services to which they should be entitled.  

You might also like