Introduction to Computer Network Vulnerabilities

  • Joseph Migga Kizza
Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure, or technical, physical, or other controls that could be exploited by a threat (Pipkin D, Information security: protecting the global enterprise. Prentice Hall PTR, Upper Saddle River, 2000).

Keywords

Product Line Hunt Defend Harness Monopoly 

References

  1. 1.
    Pipkin D (2000) Information security: protecting the global enterprise. Prentice Hall PTR, Upper Saddle RiverGoogle Scholar
  2. 2.
    Pethia RD, Information technology—essential but vulnerable: how prepared are we for attacks? http://www.cert.org/congressional_testimony/Pethia_testimony_Sep26.html
  3. 3.
    Kizza JM (2003) Ethical and social issues in the information age, 2nd edn. Springer, New YorkGoogle Scholar
  4. 4.
    Hurley J, Hemmendinger E, Open source and Linux: 2002 poster children for security problems. http://www.aberdeen.com/ab_abstracts/2002/11/11020005.htm
  5. 5.
    Palumbo J, Social engineering: what is it, why is so little said about it and what can be done? SANS. http://www.sans.org/rr/social/social.php
  6. 6.
    Granger S. Social engineering fundamentals, part I: hacker tactics. http://www.securityfocus.com/infocus/1527

Copyright information

© Springer-Verlag London 2015

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.Department of Computer ScienceUniversity of TennesseeChattanoogaUSA

Personalised recommendations