Guide To Computer Network Security Chapter4
Guide To Computer Network Security Chapter4
Vulnerabilities
Guide to Computer Network Security
Sources of Vulnerabilities
There is no definitive list of all possible
sources of these system vulnerabilities
Among the most frequently mentioned
sources of security vulnerability problems in
computer networks are
– design flaws,
– poor security management,
– incorrect implementation,
– Internet technology vulnerability,
– the nature of intruder activity,
– the difficulty of fixing vulnerable systems,
– the limits of effectiveness of reactive solutions,
– social engineering
Kizza - Guide to Computer Network Securi
ty
2
Computer Network Vulnerabilities
System vulnerabilities are weaknesses
in the software or hardware on a
server or a client that can be exploited
by a determined intruder to gain
access to or shut down a network.
A system vulnerability is a condition, a
weakness of or an absence of security
procedure, or technical, physical, or
other controls that could be exploited
by a threat
Kizza - Guide to Computer Network Securi 3
ty
Design Flaws
The two major components of a computer
system, hardware and software, quite often
have design flaws
Hardware systems are less susceptible to
design flaws than their software counterparts
owing to less complexity and the long history
of hardware engineering.
But even with all these factors backing up
hardware engineering, design flaws are still
common.
But the biggest problems in system security
vulnerability are due to software design flaws
Kizza - Guide to Computer Network Securi 4
ty
three major factors contribute a great
deal to software design flaws:
– human factors,
– software complexity,
– trustworthy software sources