Security Threats in Distributed Computing
Users may unknowingly create a security risk by using weak passwords, or by downloading a file containing a virus.
Dictionary programs specifically written to break into a password-protected system are frequently used to gain access to network systems.
Users can inadvertently download destructive viruses and Trojan horses thereby compromising your network's ability to function.
Denial of service
To prevent legitimate users of a service from using that service, attackers may attempt to flood a network, or disrupt connections or services.
Sniffers, devices or programs that are used to monitor traffic on a network can be installed anywhere in a networked system.
Many hackers can imitate any Internet Protocol (IP) device that has an IP address that allows them entrance into your system.
Using Transmission Control Protocol/Internet Protocol (TCP/IP), a hacker can enter your system through device that does not have specific security mechanisms in place.