Who are the individuals who cause these security problems, Computer Network Security

Who are the individuals who cause these security problems?

Many unauthorized people who cause network security problems for obtaining information about the other users and causing harm to them. The subsequent is the list of intruders,

(i) Student

A student can cause the network security problems for his/her fun by disturbing with the e-mails of other users.

(ii) Sales Representative

A sales representative may coz harm to the network security by pretending that he/she  is representing the whole country but not the specific state or city.

(iii) Businessman

By recognizing the strategic marketing plan of his competitor, a businessman can damage the network security.

(iv) Hacker

            A hacker can intrude the network security by thieving someone’s data or by testing the security of others system.

(v) Accountant

By unfairly obtaining the company’s money, an accountant can destroy the network security.

(vi) Ex-employee

For taking revenge of being sacked by the company, an ex-employee may interrupt the security of the network.

(vii) Spy

It damages the network security by knowing the military strength of an enemy.

(viii) Con Man

By stealing and selling the credit card numbers and all, the network security gets damaged.

(ix) Terrorist

The network security is affected by stealing the warfare information by a terrorist.

(x) Stockbroker

A stockbroker can cause harm to the network security by denying to the commitment made by him with the customer by an e-mail.

Posted Date: 7/20/2012 6:15:01 AM | Location : United States







Related Discussions:- Who are the individuals who cause these security problems, Assignment Help, Ask Question on Who are the individuals who cause these security problems, Get Answer, Expert's Help, Who are the individuals who cause these security problems Discussions

Write discussion on Who are the individuals who cause these security problems
Your posts are moderated
Related Questions
Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

IP DATAGRAM Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immedia

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. S

Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded using a

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

IDS Deployment Overview The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should s

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca

QUESTION (a) Describe the difference between static routing and dynamic routing algorithms. (b) List four functions that are performed by the Cisco IOS software during b

Ask question #Minimum 100 words acceptwwwed#