Abstract
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and procedures, especially security policies and procedures, that are used in a computer network system and in users and employees of the computer network systems. Vulnerabilities can be found in so many areas in a network system and are indeed anything in a computer network that has the potential to cause or be exploited for an advantage. This chapter explores the sources and assessment of a computer network system’s vulnerabilities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The Council of Science Editors recommends treating AI-generated content as personal communication which is: (i) in-text only, NOT in the References section and (ii) include a description of the content that was created or edited and the name of the language model or tool, version and extension numbers, and manufacturer We will follow this kind of citation throughout the text.
References
Pipkin D (2000) Information security: protecting the global enterprise. Prentice Hall PTR, Upper Saddle River
Pethia RD Information technology—essential but vulnerable: how prepared are we for attacks? https://www.computerworld.com/article/2584075/information-technology----essential-but-vulnerable--how-prepared-are-we-for-attacks.html
Kizza JM (2003) Ethical and social issues in the information age, 2nd edn. Springer, New York
Palumbo J. Social engineering: what is it, why is so little said about it and what can be done? https://www.giac.org/paper/gsec/59/social-engineering-it-about-done/100390
Granger S. Social engineering fundamentals, part I: Hacker Tactics. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=4182f6b99e9ca2efe6d3f3e9f3fd59ded36333dd
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2024 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kizza, J.M. (2024). Introduction to Computer Network Vulnerabilities. In: Guide to Computer Network Security. Texts in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-031-47549-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-47549-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-47548-1
Online ISBN: 978-3-031-47549-8
eBook Packages: Computer ScienceComputer Science (R0)