Networked computers are vulnerable to different threats arising from network security problems associated with the network infrastructure deployed for the system. Common problems may be classified as exploits, eavesdropping, backdoors, and network attacks. All these problems may compromise just a part of the network and severe attacks have the potential of compromising the entire network.
Exploits are small pieces of information transmitted through the system that connects several computers. This piece of information reassembles itself upon arriving on the host computer and becomes a small piece of software or just a sequence of commands that will take advantage of the glitches or bugs present in the computer operating system or in one of its installed software applications. The same piece of information can also retain its original file type and is activated once the required software application opens the malicious file. By exploiting the flaw in software applications, security is compromised and unauthorized remote access is inadvertently granted to hackers.
Another common problem is eavesdropping between hosts communicating on the same network. Eavesdropping tools can be used to tap the line connecting the two communicating hosts and relayed information is copied during the transmission process. Although transmissions are encrypted, built-in decryption tools are available to recover the actual information being sent.
Denial-of-service attacks (DoS), on the other hand, do not compromise the information transmitted within the system. Instead, this type of attack is intended to render a computer resource unavailable by intentionally saturating its traffic. This problem is commonly targeted towards Internet sites and services that rely on network connections to work. The basic idea behind this kind of attack involves pouring in a sufficient number of requests more than the server can handle at one time. This results to traffic congestion eventually denying legitimate access to the site from passing through.
Finally, there are backdoors that enable remote access to a computer. This vulnerability is often undetected especially if the compromised computer does not have enough security features installed in the system. Backdoors may be installed on the host computer. In more common cases, backdoors enter the system through modified programs or hardware device that may otherwise appear legitimate.
Network security problems have their roots on the systems design adapted for a particular network. By anticipating security issues that may arise and securing the network beforehand, these problems are reduced if not totally eliminated. If it is too expensive to redesign a defective computer system, then third-party security installations must be integrated into the system.
Paul De Vizard is a freelance writer who enjoys writing about all things technical. This includes Network Monitoring Tools that provide Application Performance Monitoring for large corporations.