Advertisement

Introduction to Computer Network Vulnerabilities

  • Joseph Migga Kizza
Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure, or technical, physical, or other controls that could be exploited by a threat (Pipkin D, Information security: protecting the global enterprise. Prentice Hall PTR, Upper Saddle River, 2000).

Keywords

Security Policy System Administrator Design Flaw Severe Acute Respiratory Syndrome Social Engineering 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Pipkin D (2000) Information security: protecting the global enterprise. Prentice Hall PTR, Upper Saddle RiverGoogle Scholar
  2. 2.
    Pethia RD, Information technology—essential but vulnerable: how prepared are we for attacks? http://www.cert.org/congressional_testimony/Pethia_testimony_Sep26.html
  3. 3.
    Kizza JM (2003) Ethical and social issues in the information age, 2nd edn. Springer, New YorkGoogle Scholar
  4. 4.
    Hurley J, Hemmendinger E, Open source and Linux: 2002 poster children for security problems. http://www.aberdeen.com/ab_abstracts/2002/11/11020005.htm
  5. 5.
    Palumbo J, Social engineering: what is it, why is so little said about it and what can be done? SANS. http://www.sans.org/rr/social/social.php
  6. 6.
    Granger S. Social engineering fundamentals, part I: hacker tactics. http://www.securityfocus.com/infocus/1527

Copyright information

© Springer-Verlag London 2015

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.Department of Computer ScienceUniversity of TennesseeChattanoogaUSA

Personalised recommendations