Who are the individuals who cause these security problems, Computer Network Security

Assignment Help:

Who are the individuals who cause these security problems?

Many unauthorized people who cause network security problems for obtaining information about the other users and causing harm to them. The subsequent is the list of intruders,

(i) Student

A student can cause the network security problems for his/her fun by disturbing with the e-mails of other users.

(ii) Sales Representative

A sales representative may coz harm to the network security by pretending that he/she  is representing the whole country but not the specific state or city.

(iii) Businessman

By recognizing the strategic marketing plan of his competitor, a businessman can damage the network security.

(iv) Hacker

            A hacker can intrude the network security by thieving someone’s data or by testing the security of others system.

(v) Accountant

By unfairly obtaining the company’s money, an accountant can destroy the network security.

(vi) Ex-employee

For taking revenge of being sacked by the company, an ex-employee may interrupt the security of the network.

(vii) Spy

It damages the network security by knowing the military strength of an enemy.

(viii) Con Man

By stealing and selling the credit card numbers and all, the network security gets damaged.

(ix) Terrorist

The network security is affected by stealing the warfare information by a terrorist.

(x) Stockbroker

A stockbroker can cause harm to the network security by denying to the commitment made by him with the customer by an e-mail.


Related Discussions:- Who are the individuals who cause these security problems

Introduction to security and personnel, INTRODUCTION TO SECURITY AND PERSON...

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

Cost accounting, ?Examples should include direct costs items, indirect cost...

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

Provide the network configuration, QUESTION: a) Below is a capture of a...

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

Draw the network layout, Question : a) Below is a capture of an Etherne...

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

Differentiate between private key and public key encryption, Problem (...

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Explain rsa encryption, (a) Describe RSA encryption. (b) For an RSA encr...

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

Digital certificates, A Certificate presents an organization in an official...

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

Define bridges, Bridges perform both in the data link layers and physical...

Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the

Explain what is software debouncing, Question : (a) How does a 2-key r...

Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

Describe header fields present in a udp segment, Question (a) In relati...

Question (a) In relation to a TCP segment structure, provide the fields responsible for: i. Connection Management ii. Flow Control iii. Error Control iv. Reliable, in-order

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd