Network Security Fundamentals

Topics: Computer security, Information security, Security Pages: 2 (534 words) Published: December 23, 2012
Networking Security Fundamentals
CIS 333

Nowadays, security software is becoming a major part of enterprise business. Software development is activity connected with advanced technology and high level of knowledge. After viewing the growing number of malicious activity, it is now imperative that we develop a plan and stick to it. There are so many threats to vulnerabilities and threats that leave systems open to malicious attacks. Whenever you sit at a computer and log onto the internet, your system, becomes vulnerable. There is now potential for malicious attacks. Knowing what to look for can prevent a lot of these attacks. Lets start by defining what vulnerability is. In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. ( So much of everything is done now online over the internet. With this increase it has made it easier for countries, groups, individual’s etc with malicious intensions to intrude into peoples system. They then use the information that was found to steal or make unauthorized changes in sensitive information, commit fraud, or disrupt the flow of operations. We do not want us to happen to this company here. So it’s my job to identify these vulnerabilities and mitigate them before any malicious attacks. Malicious attacks can come in many forms but generally speaking attacks fall into one of four categories. Fabrications which deception is involved to trick users, Interceptions which involve eavesdropping on transmissions and unauthorized redirecting of those transmissions, Interruptions which causes a break in communication and a blockage of data transmission, and Modifications which alters the data in transmissions (Kim & Solomon, 2012). Attacks such as...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Security Assessment
  • Preliminary Security Assessment Essay
  • Essay about Security Technologies
  • Security Assessment and Recommendation Essay
  • Website Evaluation-Homeland Security Todays Attack Prevention Essay
  • NTC411 Week 5 Security Solutions Essay
  • Identifying Potential Malicious Attacks Essay
  • Elements of Network Security Essay

Become a StudyMode Member

Sign Up - It's Free