Network Vulnerabilities and Controls Essay

Total Length: 1304 words ( 4 double-spaced pages)

Total Sources: 1

Page 1 of 4

Network Vulnerabilities and Controls

Computer networks are constantly under threat from many different sources of attacks. In order to get a clear understanding of the different views on computer security and its characteristics, it is important to define a network. This term means a group of computers that have been interconnected to communicate to one another using electrical signals. The network can be either wired or wireless and the most common of them nowadays is the wireless computer network. The internet or wide area network can link very many computers that are widely and geographically apart.

Computers are therefore linked to communicate with one another via the internet. However, these same computers are prone to attacks from all different angles. Any unauthorized access to ones computer can be defined as an attack since in the process, valuable information may be retrieved from the computer or even deleted. The information may be defined as an asset by many scholars and bodies with the international standards organization (2009) defining an attack on the computer which is the asset as any "attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset."

These attacks can either come from within or from outside an organization via the internet. Some of the threats that computer systems are vulnerable to range from viruses, spyware, malware, viruses, inception of data identity theft and hacker attacks (cisco.com). In this paper the focus will mainly be on hackers and how they operate.

Hackers defined

Bruce sterling (1993) defined a hacker as "a person who breaks into computers and computer networks for profit, as protest, or sometimes by the motivation of the challenge." Although they term themselves as computer experts, many countries businesses and individuals see the specified hackers as criminals. Some are good others are bad but they all depend on the vulnerability of the computer network to carry out their operations. They all have to get around a system in order to gain access to it. Vulnerability of the computer systems is the rating of the level of insecurity of the said systems and therefore leading to exposure to very big risks.


Hackers use various methods to exploit the weaknesses of the network systems. A weak system will always be prone cyber attacks therefore it is necessary to explore all the possible vulnerabilities of the system. In 2009 the Juniper networks inc. published a paper on "Nuclear Plant Control System Cyber Vulnerabilities and Recommendations toward securing them." They suggested that hackers are motivated by many things including money in order to make a quick buck out of the exploitation of the systems weakness. It is true that a cyber attack can cripple a fully operational plant bringing it to its knees. Any computerized system can be hacked if it is found to be lacking the proper security control measures. Attacks can be on the aviation industry, power generation plants, satellites and many more.

Data interception is the most common threat to the internet since the data that has been intercepted can be used for other harmful means, this occurs when there is a weak link in the network and this is what intruders exploit to achieve their objective. As was in the case of 1999 where a direct threat to the U.S. power stations was witnessed where a computer hacker "publicly announced his intention to release a report outlining how to break into power company networks and shut down the power grids of 30 United States utility companies" (utilities it, 2000). Probably the hacker may have intercepted data that was being transmitted to the different power companies through their systems therefore making them highly susceptible to attacks.

Hackers rely mostly on the information gathered from the internet due to the public availability of the data. The internet has got a lot of information about companies and public utilities you name it, just….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Network Vulnerabilities And Controls" (2011, June 04) Retrieved May 20, 2024, from
https://www.aceyourpaper.com/essays/network-vulnerabilities-controls-118632

Latest MLA Format (8th edition)

Copy Reference
"Network Vulnerabilities And Controls" 04 June 2011. Web.20 May. 2024. <
https://www.aceyourpaper.com/essays/network-vulnerabilities-controls-118632>

Latest Chicago Format (16th edition)

Copy Reference
"Network Vulnerabilities And Controls", 04 June 2011, Accessed.20 May. 2024,
https://www.aceyourpaper.com/essays/network-vulnerabilities-controls-118632