It can't. Any network is vulnerable, it's just a matter of how vulnerable. You can reduce the chances of in network problems by using hard passwords, closing insecure ports and reducing actual physically contact of people with the server(s).
use command prompt most as compared to GUI based and use junction clear in computer.
and use spy ware and anti ad ward tools also good but if you are using Linux or fedora type operating system its good.
internal threats are anything that harms the computer system within the organisation such as hardware failure, human error. External threats are anything that harms the system from outside the organisation, such as, viruses, hackers, spyware
Internal threats to computer security
Network security can be done in a variety of manners. In general, the methods to perform network security involve constantly updating hardware and software to combat potential computer threats.
While dealing with computers in a network, threats will always emerge. The current network threats include advanced DDos attacks, botnet attacks, insecure applications, vulnerabilities in embedded systems and sophisticated viruses.
how ip accounting helps the administrator to analyze security threats of a network?
You don't block a network protocol to prevent Trojan Horses from entering your computer. It is the ability to recognize threats and scams that enable you to defend your computer.
Program threats:Operating system's processes and kernel do the designated task as instructed. If a user programmade these process do malicious tasks then it is known as Program Threats. One of thecommon examples of program threat is a program installed in a computer which can store andsend user credentials via network to some hackerexample : VirusSystem threats:System threats refer to misuse of system services and network connections to put user introuble. System threats can be used to launch program threats on a complete network called asprogram attack. System threats create such an environment that operating system resources/user files are mis-used.example : worms
Discuss internal and external threats that companies face today and ways that you can minimize those threats. List and explain three examples.
By using Antivirus
Internal- Internal Provincial Rivalry External- Attacks from Yunnan and Tibet
Build a moat
Natural Disasters