Who are the individuals who cause these security problems, Computer Network Security

Who are the individuals who cause these security problems?

Many unauthorized people who cause network security problems for obtaining information about the other users and causing harm to them. The subsequent is the list of intruders,

(i) Student

A student can cause the network security problems for his/her fun by disturbing with the e-mails of other users.

(ii) Sales Representative

A sales representative may coz harm to the network security by pretending that he/she  is representing the whole country but not the specific state or city.

(iii) Businessman

By recognizing the strategic marketing plan of his competitor, a businessman can damage the network security.

(iv) Hacker

            A hacker can intrude the network security by thieving someone’s data or by testing the security of others system.

(v) Accountant

By unfairly obtaining the company’s money, an accountant can destroy the network security.

(vi) Ex-employee

For taking revenge of being sacked by the company, an ex-employee may interrupt the security of the network.

(vii) Spy

It damages the network security by knowing the military strength of an enemy.

(viii) Con Man

By stealing and selling the credit card numbers and all, the network security gets damaged.

(ix) Terrorist

The network security is affected by stealing the warfare information by a terrorist.

(x) Stockbroker

A stockbroker can cause harm to the network security by denying to the commitment made by him with the customer by an e-mail.

Posted Date: 7/20/2012 6:15:01 AM | Location : United States







Related Discussions:- Who are the individuals who cause these security problems, Assignment Help, Ask Question on Who are the individuals who cause these security problems, Get Answer, Expert's Help, Who are the individuals who cause these security problems Discussions

Write discussion on Who are the individuals who cause these security problems
Your posts are moderated
Related Questions
COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

What are the main differences between TCP/IP vs OSI?

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

In 10 or more pages, address the following topics (be sure to use diagrams as well as references). 1) Define broadband and baseband transmission technology. 2) Describe broadban

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es