Cargando…

Introduction to Computer Network Vulnerabilities

System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and pr...

Descripción completa

Detalles Bibliográficos
Autor principal: Kizza, Joseph Migga
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7268207/
http://dx.doi.org/10.1007/978-3-030-38141-7_4
_version_ 1783541566965547008
author Kizza, Joseph Migga
author_facet Kizza, Joseph Migga
author_sort Kizza, Joseph Migga
collection PubMed
description System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and procedures, especially security policies and procedures, that are used in a computer network system and in users and employees of the computer network systems. Vulnerabilities can be found in so many areas in a network system and are indeed anything in a computer network that has the potential to cause or be exploited for an advantage. This chapter explores the sources and assessment of a computer network system’s vulnerabilities.
format Online
Article
Text
id pubmed-7268207
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-72682072020-06-03 Introduction to Computer Network Vulnerabilities Kizza, Joseph Migga Guide to Computer Network Security Article System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and procedures, especially security policies and procedures, that are used in a computer network system and in users and employees of the computer network systems. Vulnerabilities can be found in so many areas in a network system and are indeed anything in a computer network that has the potential to cause or be exploited for an advantage. This chapter explores the sources and assessment of a computer network system’s vulnerabilities. 2020-02-07 /pmc/articles/PMC7268207/ http://dx.doi.org/10.1007/978-3-030-38141-7_4 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Kizza, Joseph Migga
Introduction to Computer Network Vulnerabilities
title Introduction to Computer Network Vulnerabilities
title_full Introduction to Computer Network Vulnerabilities
title_fullStr Introduction to Computer Network Vulnerabilities
title_full_unstemmed Introduction to Computer Network Vulnerabilities
title_short Introduction to Computer Network Vulnerabilities
title_sort introduction to computer network vulnerabilities
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7268207/
http://dx.doi.org/10.1007/978-3-030-38141-7_4
work_keys_str_mv AT kizzajosephmigga introductiontocomputernetworkvulnerabilities