Skip to main content

Introduction to Computer Network Vulnerabilities

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Texts in Computer Science ((TCS))

  • 668 Accesses

Abstract

System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and procedures, especially security policies and procedures, that are used in a computer network system and in users and employees of the computer network systems. Vulnerabilities can be found in so many areas in a network system and are indeed anything in a computer network that has the potential to cause or be exploited for an advantage. This chapter explores the sources and assessment of a computer network system’s vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The Council of Science Editors recommends treating AI-generated content as personal communication which is: (i) in-text only, NOT in the References section and (ii) include a description of the content that was created or edited and the name of the language model or tool, version and extension numbers, and manufacturer We will follow this kind of citation throughout the text.

References

  1. Pipkin D (2000) Information security: protecting the global enterprise. Prentice Hall PTR, Upper Saddle River

    Google Scholar 

  2. Pethia RD Information technology—essential but vulnerable: how prepared are we for attacks? https://www.computerworld.com/article/2584075/information-technology----essential-but-vulnerable--how-prepared-are-we-for-attacks.html

  3. Kizza JM (2003) Ethical and social issues in the information age, 2nd edn. Springer, New York

    Google Scholar 

  4. Palumbo J. Social engineering: what is it, why is so little said about it and what can be done? https://www.giac.org/paper/gsec/59/social-engineering-it-about-done/100390

  5. Granger S. Social engineering fundamentals, part I: Hacker Tactics. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=4182f6b99e9ca2efe6d3f3e9f3fd59ded36333dd

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Migga Kizza .

Rights and permissions

Reprints and permissions

Copyright information

© 2024 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kizza, J.M. (2024). Introduction to Computer Network Vulnerabilities. In: Guide to Computer Network Security. Texts in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-031-47549-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-47549-8_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-47548-1

  • Online ISBN: 978-3-031-47549-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics