Who are the individuals who cause these security problems, Computer Network Security

Who are the individuals who cause these security problems?

Many unauthorized people who cause network security problems for obtaining information about the other users and causing harm to them. The subsequent is the list of intruders,

(i) Student

A student can cause the network security problems for his/her fun by disturbing with the e-mails of other users.

(ii) Sales Representative

A sales representative may coz harm to the network security by pretending that he/she  is representing the whole country but not the specific state or city.

(iii) Businessman

By recognizing the strategic marketing plan of his competitor, a businessman can damage the network security.

(iv) Hacker

            A hacker can intrude the network security by thieving someone’s data or by testing the security of others system.

(v) Accountant

By unfairly obtaining the company’s money, an accountant can destroy the network security.

(vi) Ex-employee

For taking revenge of being sacked by the company, an ex-employee may interrupt the security of the network.

(vii) Spy

It damages the network security by knowing the military strength of an enemy.

(viii) Con Man

By stealing and selling the credit card numbers and all, the network security gets damaged.

(ix) Terrorist

The network security is affected by stealing the warfare information by a terrorist.

(x) Stockbroker

A stockbroker can cause harm to the network security by denying to the commitment made by him with the customer by an e-mail.

Posted Date: 7/20/2012 6:15:01 AM | Location : United States







Related Discussions:- Who are the individuals who cause these security problems, Assignment Help, Ask Question on Who are the individuals who cause these security problems, Get Answer, Expert's Help, Who are the individuals who cause these security problems Discussions

Write discussion on Who are the individuals who cause these security problems
Your posts are moderated
Related Questions
Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

TCP-RELIABLE TRANSPORT SERVICE INTRODUCTION:  TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP whe

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in deci

Question: (a) African governments are slowly shifting to more transparent ICT regulations. However, but limited spectrum availability remains a key barrier to sustaining lon

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to di

UDP DATAGRAM FORMAT: It is given in the figure below:

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

Question (a) In relation to a TCP segment structure, provide the fields responsible for: i. Connection Management ii. Flow Control iii. Error Control iv. Reliable, in-order