answersLogoWhite

0

It can't. Any network is vulnerable, it's just a matter of how vulnerable. You can reduce the chances of in network problems by using hard passwords, closing insecure ports and reducing actual physically contact of people with the server(s).

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

What was Luis Luis von Ahn's great idea for thwarting spammersHow does it work?

Internal threats to computer security


How does one do network security?

Network security can be done in a variety of manners. In general, the methods to perform network security involve constantly updating hardware and software to combat potential computer threats.


What are current network threats?

While dealing with computers in a network, threats will always emerge. The current network threats include advanced DDos attacks, botnet attacks, insecure applications, vulnerabilities in embedded systems and sophisticated viruses.


Which protocol should be blocked to prevent Trojan attacks?

You don't block a network protocol to prevent Trojan Horses from entering your computer. It is the ability to recognize threats and scams that enable you to defend your computer.


How IP accounting helps the administrator to analyze the security threats to a network?

how ip accounting helps the administrator to analyze security threats of a network?


What is the difference between program threats and system threats?

Program threats:Operating system's processes and kernel do the designated task as instructed. If a user programmade these process do malicious tasks then it is known as Program Threats. One of thecommon examples of program threat is a program installed in a computer which can store andsend user credentials via network to some hackerexample : VirusSystem threats:System threats refer to misuse of system services and network connections to put user introuble. System threats can be used to launch program threats on a complete network called asprogram attack. System threats create such an environment that operating system resources/user files are mis-used.example : worms


Internal and external threats to ict systems?

internal threats are anything that harms the computer system within the organisation such as hardware failure, human error. External threats are anything that harms the system from outside the organisation, such as, viruses, hackers, spyware


What would be the cell membrane of a computer?

In a computer, the closest analogy to a cell membrane would be the firewall or security software that acts as a barrier between the internal system and external threats, regulating the flow of data in and out of the computer.


How do you secure computer from computer threats?

By using Antivirus


Discuss internal and external threats companies face today and ways you can minimize those threats List and explain 3 examples?

Discuss internal and external threats that companies face today and ways that you can minimize those threats. List and explain three examples.


Disadvantages of a communications network?

Setting up a computer-based communications network requires investment in both physical and human capital. Also, it opens the organization up to new information security threats like hackers and viruses.


Where is firewall under hood?

A firewall operates at the network layer of a computer system, typically positioned between the internal network and external networks, such as the internet. It can be implemented as hardware, software, or a combination of both, filtering incoming and outgoing traffic based on predefined security rules. Firewalls can be found in routers, dedicated appliances, or as software applications on individual devices, protecting against unauthorized access and threats.