answersLogoWhite

0


Best Answer
  1. Software defect This is the most common one will encounter. A defect can be in operating system

    software or application software. Defects in the OS are typically more worrisome, but an application defect can be just as troublesome. For example, a defect in a database management system (DBMS) that allows customers' data to be viewed by unauthorized people on the Web is just as damaging as revealing that same data through an OS defect. Examples of typical sofware defects are buffer overflows, design problems that allow access to functions that should be disallowed, allowing malformed input, allowing access to files or data that should be disallowed, and so on.

  2. Clear text data captured It is more true now, that the usage of wifi is a common practice. If user, password, or other data is transmitted across open networks in clear text, it can be intercepted and used. A classic example is the difference between TELNET and SSH. TELNET transmits all data including passwords and login names in clear text. Anyone on the network and have their network card in promiscuous mode, can sniff out the login information and gain access to a system. SSH uses encryption on all traffic and is more secure. The same is true when using FTP instead of SFTP.
  3. Weak passwords Crackable or easily guessable passwords are a common way for hackers to gain initial access to a system. Cracking passwords are much more easier with more people having access to very powerful computers than ever before; and if you can network a host of powerfull computers to crack passwords the possibiulites are great. Because of the fact that linux passwords (and commands) are case sensitive, one should take advantage of this and use both uppercase and lowercase words along with numbers punctuation marks and even spaces. And change it often, atleast once a month.
  4. Spoofing Spoofing occurs when an attacker pretends to be an entity and takes over communication between systems. For example, if SystemA and SystemB are communicating, the attacker could set up SystemC to use SystemB's IP address, hostname, and so on. The hacker could then use a DoS attack to knock SystemB offline and take over the "conversation" with SystemA.
  5. Carelessness Carelessness is a human error that hackers exploit to gain access to a system that is exposed through negligence or stupidity. Two classic examples are using the default password and writing down a password.
  6. Denial of service "A denial-of-service attack (also, DoS attack) is an attack on a computer system or network that causes a loss of service to users, typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational resources of the victim system" (from http://en.wikipedia.org/wiki/Denial_of_service). Examples are invalid packet floods, valid packet floods, and service floods such as HTTP attacks.
  7. Access controls restriction This condition occurs when permission to access a resource (a service, file, directory, system) is not properly restricted.

I am sure there are other types of vulnerabilities that should be taken just as seriously as the one mentioned above. However you can never be too secure. So don't only think about conventional methods of attacks and securing your system, chances are like yourself, an attacker is also thinking out of the box to attack your system.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: List six different types of vulnerabilities critical for computer network security?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the vulnerabilities of using security?

There are many vulnerablities of using security. The vulnerabilities depend on what type of security is being discussed. In terms of computer software security, security vulnerabilities involve weaknesses and problems that occur in a product as well as the integrity of the product. Vulnerabilities regarding home security are fewer than those involving software. One major vulnerability of home security is that the systems often run through phone lines which can be cut or damaged due to power outages.


What are designed security to fix security vulnerabilities?

A Patch


What services does Core impact provide?

Core Impact is a testing solution to assess critical security vulnerabilities. It scans for potential vulnerabilities, pin-points real-world threats, and prioritizes remedies to guard against cyber-criminals.


How does a computer security vulnerability occur?

Vulnerabilities exist because of exploits in code or networking protocols. Millions of lines of code are required to make an operating system, and sometimes vulnerabilities can be found within. It's no different than having a house and accidentally leaving a window open for a burglar to get in easily. Unfortunately, many computer science curricula concentrate on coding projects without regard for coding securely. Security as an afterthought is not as effective as incorporating security in the beginning.


What are the bad things of web browser add-ons?

They slow down your computer and sometimes can create vulnerabilities in the security of your web browser.


Risk is determined from the analysis of available safeguards for IS assets security requirements threats and?

a. vulnerabilities


Risk is determined from the analysis of available safeguards for IS assets security requirements threats and vulnerabilities?

vulnerabilities


What is the security triple?

Threats, Assets, and Vulnerabilities.


What is the purpose of Operations Security OPSEC in your workplace?

Reduce mission vulnerabilities, protect critical/sensitive information, safeguard mission plans (regardless of calssification) and deter adversaries access.


What is the difference between operating system security and network security?

operating system security concerns about vulnerabilities on specific operating system network system security concerns about vulnerabilities of the entire network regrdless how diverse or complex the network is.


What are some of the options that can exercise when using the MBSA tool?

The Microsoft Baseline Security Analyzer (MBSA) is a tool often used by IT professionals to help assist them in managing security for their organization. It is usually used by IT professionals that work for small and medium- sized businesses or organizations. It is a tool that is a security scanner that helps determine if there are any security misconfigurations in a computer network system.


What is the purpose of Operation Security in the workplace?

Reduce Vulnerabilities to AF Missions Protect critical and sensitive information Safeguard mission plan, even if unclassified Deter adversaries from gaining vulnerable information