Some Types of Network Security Breaches

The online world has grown in leaps and bounds in the last few years. This provides the public with some amazing resources - the ability to access information with the touch of a finger, the ability to communicate via fast and inexpensive methods, and more functionality and ease of use are being introduced every day. Unfortunately, as with all good things, there is also a dark side.

While there are plenty of people who use the internet and computers responsibly and honestly, there are predators and hackers out there who spoil the fun for everyone if their dirty deeds go unchecked. There are a lot of ways for these people to compromise your computer and your network. Below we will review just a few of the ways that your network can be compromised.

Two destructive network breaches fall under a category known as "destructive behavior." One involves the complete obliteration of data within your network. It is called "data destruction" and it is just what it sounds like. It happens when someone breaches your network and deletes data. If your network is business-related, this can be devastating. Experts say that it is no less destructive than a fire that destroys your computer equipment.

Some perpetrators have more than simple destruction in mind. They do something called "data diddling" which means that they alter the data in your system. They might change data in spreadsheets or other documents, or they might tamper with your accounting system. Some examples of things that have really happened involve the accounting system specifically. "Hackers" have broken into a network, accessed the accounting system, and changed the account numbers on direct deposit paychecks to go into their own accounts. Thefts like this take some time to track down - first the employee has to not get paid, investigations have to be made, and someone has to think to double-check the direct deposit account information. In some cases, companies have cut new paper checks and it has taken months to retrieve the lost funds.

Another way in which networks are vulnerable is in the realm of confidentiality. A lot of times, companies possess information that, if shared with a competitor, could be very bad for business. In this case, predators are not looking to alter or destroy data, they are merely trying to find out information they're not supposed to know. If someone were to find out financial performance information before a public release of said information it could affect the stock negatively. If a company is planning to roll out a new product and someone gets that information and gives it to a competitor, or leaks the information to the public, it could hurt the company's sales. Even more frightening is the possibility of someone breaking in to view confidential employee-related data - like home addresses, social security numbers, and bank account information.

All of these network attacks happen because outside users are able to gain unauthorized access to a network. To access information, change data, or delete data, the attacker gains access to a network and is able to execute illicit commands - either at the normal user level or at the administrator level. Both are bad, but luckily both can be avoided if you take these threats seriously and develop sound policies regarding your network security .

Lawrence Reaves works for PLANIT Technology Group, a leading provider of Richmond enterprise storage and Virginia Beach network security. PLANIT can be found online at:

Article Source:


Post a Comment

Best Brands

Anti Virus (5) Antivirus 2011 (1) antivirus terbaru (5) aplikasi gratis (2) Apple (1) Avira Antivir terbaru (1) berita teknologi (28) Bisnis Onlie (3) Bisnis Online (2) Blogvertise (1) Browser (3) Cara cari uang di Internet (1) Custom Blog (1) Dampak Teknologi Informasi (2) Digital Camera (6) Domain (1) download (9) ebook (1) error pada shoutmix (1) Excel (1) Facebook (8) Free Webhosting (1) Game (1) google (1) GPS (1) Handphone (3) Hardware (13) Hosting (1) HTML (1) IMCrew (1) Internet (24) Internet Explorer (1) iPAD (1) iPhone (1) Jaringan Komputer (7) Kebijakan Pemerintah (1) Kolom Tutorial (27) Komputer (5) Komputer terbaru (2) LAN (9) Lapop (3) laptop (1) Laptop 3D (1) laptop blue screen (2) Links Exchange (1) Linux (6) Makalah TIK (2) Materi Pembelajaran TIK (11) Materi TIK SMP Kelas 7 (16) Materi TIK SMP Kelas 8 (6) Materi TIK SMP Kelas 9 (2) mengatasi blue screen (1) Mengatasi komputer hang (1) Microsoft Office (8) monitor (1) Mouse (1) Netbook (1) Nokia (2) Notebook (10) Operasi Dasar Pada Operating System (1) Operating System (13) optimasi blog (3) Paid Review (1) paypal (1) PC (3) Pengantar Ilmu Komputer (4) Pengenalan komputer (2) Pengolah Grafis (1) PerananTeknologi Informasi (2) Perangkat Keras (3) Perangkat Lunak (1) Perkembangan TIK (14) Pernanan Teknologi Informasi (3) Photoshop (1) Ponsel (1) Pornografi Blog (1) PowerPoint (1) Powersuplly (1) PTC (1) Review Program (1) Samsung (1) Search engine (1) Sejarah Komputer (6) Sejarah TIK (2) SEO (2) Sistem Operasi (2) Smadav 8.4 (1) Smadav Januari 2010 (1) SMS (1) Soal TIK (2) Software (30) Software Pengolah Gambar (1) Teknologi Informasi (3) TIK (1) tips and trik (1) Tips and Triks (14) Twitter (1) Ubuntu (2) Video (1) Virus Komputer (2) Windows (5) Wireless (5) Yahoo (1)