Facts About Vulnerabilities In Network Security3 min read

vulnerabilities in network security

Facts About Vulnerabilities In Network Security

 

 

 

In my previous article, I have talked about some of the facts that you need to know about network security landscape. In this article, I want to look at some of the facts that you need to know about vulnerabilities in network security. Follow me as we will look at that together in this article. First and foremost, the National Institute of Standards and Technology (NIST): Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.

 

ISO 27005: A weakness of an asset or group of assets that can be exploited by one or more cyber threats where an asset is anything that has value to the organization, its business operations and their continuity, including information resources that support the organization’s mission.

IETF RFC 4949: A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy.

ENISA: The existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the computer system, network, application, or protocol involved. 

 

Now malware…

Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. As Microsoft puts it, “[malware] is a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network.” In other words, the software is identified as malware based on its intended use, rather than a particular technique or technology used to build it.

 

READ THIS  Infographics: Killing Unwanted Processes In Windows 7

Types of malware

There are a number of different ways of categorizing malware; the first is by how the malicious software spreads. You’ve probably heard the words virus, trojanand worm used interchangeably, but as Symantec explains, they describe three subtly different ways malware can infect target computers

vulnerabilities in network security

A worm is a standalone piece of malicious software that reproduces itself and spreads from computer to computer.

A virus is a piece of computer code that inserts itself within the code of another standalone program, then forces that program to take malicious action and spread itself.

A trojan is a program that cannot reproduce itself but masquerades as something the user wants and tricks them into activating it so it can do its damage and spread.

 

Action Point

I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.

 

 

 

Download Our App.

         

CEHNigeria On Google Playstore

Download Our Blog App On Google Playstore.

 

Have a deeper understanding of Google Search Console. Use SEOPOZ

         

GET SEOPOZ. OUTSMART YOUR BLOG COMPETITORS

Have a deeper understanding of Google Search Console. Join SEOPOZ for free.

Join Our Whatsapp Group Here

         

Join Our Whatsapp Group

Follow Us On Twitter and I will Follow Back

         

Follow Us On Twitter

Kindly follow me on Twitter and I promise I will follow back. Aside you all get updates when we post new articles.

About Adeniyi Salau 601 Articles
I am an IT enthusiast and a man of many parts. I am a Certified Digital Marketer, Project Manager and a Real Estate Consultant. I love writing because that's what keeps me going. I am running this blog to share what I know with others. I am also a Superlife Stem Cell Distributor. Our Stem Cell Products can cure many ailments.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


CommentLuv badge