Top 10 Vulnerabilities of Computer Networks
Downloads
Today’s public communication network is, for the most part, at least as easy to exploit as at any time in the history of telecommunications. The design of the public switched network is such that some parts of it are vulnerable to relatively easy exploitation (wiretaps on copper cable, over-the-air interception), while others (e.g., fiber optic cable) present greater inherent barriers to exploitation. There are, and will likely remain, opportunities for casual, generally untargeted eavesdropping of communications. However, targeted and consistently successful unauthorized access requires greater resources. For systems with sophisticated safeguards, the resource requirements may frustrate even the efforts of national intelligence agencies.
Today's state-of-the-art network security appliances do a great job of keeping the cyber monsters from invading your business. But what do you do when the monster is actually inside the security perimeter? Unfortunately, all of the crosses, garlic, wooden stakes and silver bullets in the world have little effect on today's most nefarious cyber creatures. Here are the top 10 ways your network can be attacked from inside and what you can do to insure your business never has to perform an “exorcism” on your servers.
Downloads
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Prakash and Kevin Borders, “Social Networks and context-aware apam”, CSCW ’08 Proceedings of the 2008 ACM conference on Computer supported cooperative work, 2008, pp. 403-412.
Sergiu Adrian Vasile, Noțiuni de informatică și informatică aplicată, Edit. Sitech, 2009.
Ioan- Cosmin Mihai, Securitatea Sistemului Informatic, Edit. Fundației Universitare ”Dunărea de Jos”, 2007.
www.princeton.edu




