Security Standards  «Prev 

Security Threats in Distributed Computing

User-created breach

Security Threats consisting of 1) User created breach 2) Password Cracking 3) Trojan horse 4) Denial of Service 5) Packets Sniffers 6) IP spoofing 7) System snooping

Users may unknowingly create a security risk by using weak passwords, or by downloading a file containing a virus.

Password cracking

Dictionary programs specifically written to break into a password-protected system are frequently used to gain access to network systems.

Trojan horse

Users can inadvertently download destructive viruses and Trojan horses thereby compromising your network's ability to function.

Denial of service

To prevent legitimate users of a service from using that service, attackers may attempt to flood a network, or disrupt connections or services.

Packet sniffer

Sniffers, devices or programs that are used to monitor traffic on a network can be installed anywhere in a networked system.

IP spoofing

Many hackers can imitate any Internet Protocol (IP) device that has an IP address that allows them entrance into your system.

System snooping

Using Transmission Control Protocol/Internet Protocol (TCP/IP), a hacker can enter your system through device that does not have specific security mechanisms in place.