Who are the individuals who cause these security problems, Computer Network Security

Who are the individuals who cause these security problems?

Many unauthorized people who cause network security problems for obtaining information about the other users and causing harm to them. The subsequent is the list of intruders,

(i) Student

A student can cause the network security problems for his/her fun by disturbing with the e-mails of other users.

(ii) Sales Representative

A sales representative may coz harm to the network security by pretending that he/she  is representing the whole country but not the specific state or city.

(iii) Businessman

By recognizing the strategic marketing plan of his competitor, a businessman can damage the network security.

(iv) Hacker

            A hacker can intrude the network security by thieving someone’s data or by testing the security of others system.

(v) Accountant

By unfairly obtaining the company’s money, an accountant can destroy the network security.

(vi) Ex-employee

For taking revenge of being sacked by the company, an ex-employee may interrupt the security of the network.

(vii) Spy

It damages the network security by knowing the military strength of an enemy.

(viii) Con Man

By stealing and selling the credit card numbers and all, the network security gets damaged.

(ix) Terrorist

The network security is affected by stealing the warfare information by a terrorist.

(x) Stockbroker

A stockbroker can cause harm to the network security by denying to the commitment made by him with the customer by an e-mail.

Posted Date: 7/20/2012 6:15:01 AM | Location : United States







Related Discussions:- Who are the individuals who cause these security problems, Assignment Help, Ask Question on Who are the individuals who cause these security problems, Get Answer, Expert's Help, Who are the individuals who cause these security problems Discussions

Write discussion on Who are the individuals who cause these security problems
Your posts are moderated
Related Questions
The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Consider the details of the X.509 certificate shown below. a. Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the nam

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardwa

Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth