Cargando…
Introduction to Computer Network Vulnerabilities
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and pr...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7268207/ http://dx.doi.org/10.1007/978-3-030-38141-7_4 |
_version_ | 1783541566965547008 |
---|---|
author | Kizza, Joseph Migga |
author_facet | Kizza, Joseph Migga |
author_sort | Kizza, Joseph Migga |
collection | PubMed |
description | System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and procedures, especially security policies and procedures, that are used in a computer network system and in users and employees of the computer network systems. Vulnerabilities can be found in so many areas in a network system and are indeed anything in a computer network that has the potential to cause or be exploited for an advantage. This chapter explores the sources and assessment of a computer network system’s vulnerabilities. |
format | Online Article Text |
id | pubmed-7268207 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
record_format | MEDLINE/PubMed |
spelling | pubmed-72682072020-06-03 Introduction to Computer Network Vulnerabilities Kizza, Joseph Migga Guide to Computer Network Security Article System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and procedures, especially security policies and procedures, that are used in a computer network system and in users and employees of the computer network systems. Vulnerabilities can be found in so many areas in a network system and are indeed anything in a computer network that has the potential to cause or be exploited for an advantage. This chapter explores the sources and assessment of a computer network system’s vulnerabilities. 2020-02-07 /pmc/articles/PMC7268207/ http://dx.doi.org/10.1007/978-3-030-38141-7_4 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Kizza, Joseph Migga Introduction to Computer Network Vulnerabilities |
title | Introduction to Computer Network Vulnerabilities |
title_full | Introduction to Computer Network Vulnerabilities |
title_fullStr | Introduction to Computer Network Vulnerabilities |
title_full_unstemmed | Introduction to Computer Network Vulnerabilities |
title_short | Introduction to Computer Network Vulnerabilities |
title_sort | introduction to computer network vulnerabilities |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7268207/ http://dx.doi.org/10.1007/978-3-030-38141-7_4 |
work_keys_str_mv | AT kizzajosephmigga introductiontocomputernetworkvulnerabilities |