1. Viruses : Computer programs written by
devious programmer and design to replicate
themselves and infect computers when
triggered by specific event.
2. Trojan horse programs : Delivery vehicles
for destructive code, which appear to be
harmless or useful software programs such as
games.
3. Vandals -. Software applications or applets
that cause destruction
4. Attack : Including Reconnaissance attacks
(info -gathering activities to collect data that
is later use to compromised the networks);
access attack (exploit network vulnerability in
order to gain entry to e-mail,database or the
corporate network;
5.Denial - Of - Service attack ( which all
hacker to shutdown or crash the server)
6. Data Interception : Involves eavesdropping
on communications or altering data packets
being transmitted.
7. Social Engineering : Obtaining Confidential
network security information through
nontechnical means, such as posing as a
technical support person and asking for
people's password.
Wednesday, 16 December 2015
THREATS TO NETWORK SECURITY
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment