Cargando…
Introduction to Computer Network Vulnerabilities
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure, or technica...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7123680/ http://dx.doi.org/10.1007/978-3-319-55606-2_4 |
_version_ | 1783515689909223424 |
---|---|
author | Kizza, Joseph Migga |
author_facet | Kizza, Joseph Migga |
author_sort | Kizza, Joseph Migga |
collection | PubMed |
description | System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure, or technical, physical, or other controls that could be exploited by a threat [1]. |
format | Online Article Text |
id | pubmed-7123680 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
record_format | MEDLINE/PubMed |
spelling | pubmed-71236802020-04-06 Introduction to Computer Network Vulnerabilities Kizza, Joseph Migga Guide to Computer Network Security Article System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure, or technical, physical, or other controls that could be exploited by a threat [1]. 2017-02-21 /pmc/articles/PMC7123680/ http://dx.doi.org/10.1007/978-3-319-55606-2_4 Text en © Springer International Publishing AG 2017 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Kizza, Joseph Migga Introduction to Computer Network Vulnerabilities |
title | Introduction to Computer Network Vulnerabilities |
title_full | Introduction to Computer Network Vulnerabilities |
title_fullStr | Introduction to Computer Network Vulnerabilities |
title_full_unstemmed | Introduction to Computer Network Vulnerabilities |
title_short | Introduction to Computer Network Vulnerabilities |
title_sort | introduction to computer network vulnerabilities |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7123680/ http://dx.doi.org/10.1007/978-3-319-55606-2_4 |
work_keys_str_mv | AT kizzajosephmigga introductiontocomputernetworkvulnerabilities |