Network Security Fundamentals

Only available on StudyMode
  • Download(s) : 86
  • Published : December 23, 2012
Open Document
Text Preview
Networking Security Fundamentals
CIS 333

Nowadays, security software is becoming a major part of enterprise business. Software development is activity connected with advanced technology and high level of knowledge. After viewing the growing number of malicious activity, it is now imperative that we develop a plan and stick to it. There are so many threats to vulnerabilities and threats that leave systems open to malicious attacks. Whenever you sit at a computer and log onto the internet, your system, becomes vulnerable. There is now potential for malicious attacks. Knowing what to look for can prevent a lot of these attacks. Lets start by defining what vulnerability is. In computer security, vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. ( So much of everything is done now online over the internet. With this increase it has made it easier for countries, groups, individual’s etc with malicious intensions to intrude into peoples system. They then use the information that was found to steal or make unauthorized changes in sensitive information, commit fraud, or disrupt the flow of operations. We do not want us to happen to this company here. So it’s my job to identify these vulnerabilities and mitigate them before any malicious attacks. Malicious attacks can come in many forms but generally speaking attacks fall into one of four categories. Fabrications which deception is involved to trick users, Interceptions which involve eavesdropping on transmissions and unauthorized redirecting of those transmissions, Interruptions which causes a break in communication and a blockage of data transmission, and Modifications which alters the data in transmissions (Kim & Solomon, 2012). Attacks such as...
tracking img