Scimyst
Subscribe
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    the ancient buddha statue for women is very beautiful but extremely vivid 119168

    Chilling Ancient Punishments for Women with Beautiful but Bloodied Names

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

  • Events
    • All
    • Science Stories
    • Scientific Projects

    Tonight announces the Ig Nobel Prize winners

    frog

    Frog Wins Ig Nobel Prize 2005

    canhcutIg

    Life is Not Lacking in Quirks

    Nobel Prize in Medicine 2005: A Modern Fairy Tale

    10 Weird Inventions Awarded the Ig Nobel Prize 2005

    nobelKT

    Why Did They Win the Nobel Prize in Economics?

    giaydientu

    “Electronic Paper” Set to Appear on the Market

    Development of Science and Technology in the South Central Coast and Central Highlands Provinces

    a russian scientist loves vietnam 1659

    A Russian Scientist Who Loves Vietnam

  • Lifestyle
    • All
    • Environment
    • Medicine & Health
    tdnong

    Global warming may be the cause of major storms

    traxanh1

    Green tea has effects against dementia

    Discovery of Cancer-Preventing Genes in the Human Body

    Khachdulich Indonesia

    Avian influenza harms tourism more than terrorism

    nao

    Lying – A Disease of People with Brain Defects

    cafe

    Coffee May Prevent Cancer

    tebaocum

    Recreating the ‘Death’ Flu Virus of 1918

    Indo ban

    The whole world unites to fight avian influenza

    HIV aids

    The Mystery of AIDS Epidemic

  • Technology
    • All
    • AI - Artificial Intelligence
    • Computer Science
    • New Technology
    • Scientific Inventions
    top apps explore space solar system on pc 98000

    Top Applications for Exploring the Universe and Solar System on PC

    vai dien tu 650

    Soon there will be data-transmitting clothing

    sua loi khong vao dc coc coc 650

    Why can’t Cốc Cốc download videos to the computer?

    may tinh cu 1

    17 Things You Can Do with an Old Computer

    play free games super fun on android devices 54708

    Play Extremely Fun Free Games on Android Devices

    top 10 best weather apps on android 98127

    Top 10 Best Astronomy Apps on Android

    how to charge iphone properly 122474

    How to Charge an iPhone the Right Way

    do not scan qr code finger 122198

    Don’t Scan QR Codes Randomly

    sensor technology for measuring oxygen in blood 120461

    Light-Emitting Sensor Technology Can Measure Blood Oxygen

  • Cultural Heritage
    ai cap 650

    The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

    khao co 650

    Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

    baroque churches philippines 67188

    Baroque Churches – Philippines

    mont saint michel france 67265

    Mont Saint Michel Island – France

    acropolis bracelet in athens greece 67621

    Acropolis Fortress in Athens – Greece

    language mo tan thuy hoang china 67087

    Tomb of Qin Shi Huang – China

    historical city ayutthaya 67804

    Historical City of Ayutthaya

    mesa verde national park 67201

    Mesa Verde National Park – United States of America

    to the taj mahal india 67153

    Taj Mahal Temple – India

  • Entertainment
    • All
    • Photo Library
    • Videos

    Honesty

    Telephone

    Advanced Technology

    Terminal Illness

    Allergy

    Love Like Mars

    Super Definition

    Coi Sách

    Selling Candy

No Result
View All Result
Scimyst
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    the ancient buddha statue for women is very beautiful but extremely vivid 119168

    Chilling Ancient Punishments for Women with Beautiful but Bloodied Names

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

  • Events
    • All
    • Science Stories
    • Scientific Projects

    Tonight announces the Ig Nobel Prize winners

    frog

    Frog Wins Ig Nobel Prize 2005

    canhcutIg

    Life is Not Lacking in Quirks

    Nobel Prize in Medicine 2005: A Modern Fairy Tale

    10 Weird Inventions Awarded the Ig Nobel Prize 2005

    nobelKT

    Why Did They Win the Nobel Prize in Economics?

    giaydientu

    “Electronic Paper” Set to Appear on the Market

    Development of Science and Technology in the South Central Coast and Central Highlands Provinces

    a russian scientist loves vietnam 1659

    A Russian Scientist Who Loves Vietnam

  • Lifestyle
    • All
    • Environment
    • Medicine & Health
    tdnong

    Global warming may be the cause of major storms

    traxanh1

    Green tea has effects against dementia

    Discovery of Cancer-Preventing Genes in the Human Body

    Khachdulich Indonesia

    Avian influenza harms tourism more than terrorism

    nao

    Lying – A Disease of People with Brain Defects

    cafe

    Coffee May Prevent Cancer

    tebaocum

    Recreating the ‘Death’ Flu Virus of 1918

    Indo ban

    The whole world unites to fight avian influenza

    HIV aids

    The Mystery of AIDS Epidemic

  • Technology
    • All
    • AI - Artificial Intelligence
    • Computer Science
    • New Technology
    • Scientific Inventions
    top apps explore space solar system on pc 98000

    Top Applications for Exploring the Universe and Solar System on PC

    vai dien tu 650

    Soon there will be data-transmitting clothing

    sua loi khong vao dc coc coc 650

    Why can’t Cốc Cốc download videos to the computer?

    may tinh cu 1

    17 Things You Can Do with an Old Computer

    play free games super fun on android devices 54708

    Play Extremely Fun Free Games on Android Devices

    top 10 best weather apps on android 98127

    Top 10 Best Astronomy Apps on Android

    how to charge iphone properly 122474

    How to Charge an iPhone the Right Way

    do not scan qr code finger 122198

    Don’t Scan QR Codes Randomly

    sensor technology for measuring oxygen in blood 120461

    Light-Emitting Sensor Technology Can Measure Blood Oxygen

  • Cultural Heritage
    ai cap 650

    The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

    khao co 650

    Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

    baroque churches philippines 67188

    Baroque Churches – Philippines

    mont saint michel france 67265

    Mont Saint Michel Island – France

    acropolis bracelet in athens greece 67621

    Acropolis Fortress in Athens – Greece

    language mo tan thuy hoang china 67087

    Tomb of Qin Shi Huang – China

    historical city ayutthaya 67804

    Historical City of Ayutthaya

    mesa verde national park 67201

    Mesa Verde National Park – United States of America

    to the taj mahal india 67153

    Taj Mahal Temple – India

  • Entertainment
    • All
    • Photo Library
    • Videos

    Honesty

    Telephone

    Advanced Technology

    Terminal Illness

    Allergy

    Love Like Mars

    Super Definition

    Coi Sách

    Selling Candy

No Result
View All Result
Scimyst
No Result
View All Result
Home Technology Computer Science

Network Security and What You Need to Know

by Sci
December 30, 2005
in Computer Science
0
Share on FacebookShare on Twitter

firewallWhile network and Internet technologies provide numerous growth and competitive opportunities for small and medium-sized businesses (SMBs), they also raise the urgent need to protect computer systems against security threats.
 
According to a survey conducted by the Computer Security Institute (CSI) in 2003, as much as 78% of computers were attacked through the Internet (up from 59% in 2000). Today, even the smallest businesses feel compelled to engage in online activities, bringing several factors that must be ensured for this model.
 
However, according to Jim Browning, Vice President and Director of SMB Research at Gartner, most businesses do not adequately recognize the importance of security; they often overlook it when it should be a top priority for online operations.
 
If not properly protected, every part of a network system becomes a target for hackers, competitors, or even employees within the company. Although in 2005, 40% of SMBs implemented security network management and increased their Internet usage, Gartner’s statistics show that more than half of them were even unaware that they were being attacked by hackers.
 
Fundamental Platforms
 
Like many other types of crime, network threats and Internet resources originate from a small community. Despite their small numbers, these factors continue to grow as there are few effective regulations to restrain them; merely one attack tool disseminated online can immediately target numerous computer systems through software vulnerabilities. Those behind these attacks can be hackers, software crackers, or “insiders.”

– Access Control: This involves verifying identity and deciding whether to grant access to the network. Authentication may be through passwords or more complex measures like biometric devices (fingerprint or facial recognition).
– Firewall: A software or hardware solution that helps prevent unauthorized access attempts from the outside or only allows legitimate data to enter the network. Nowadays, firewalls are widely used in corporate network systems.
– Identity Management: Identifying users and their current acceptance status, defining and enforcing access rights to system and network resources.
– Intrusion Detection: The capability of software to analyze network activity, detect intrusion behavior, and notify administrators.
– Threat Prevention: The integration of multiple security technologies (firewalls, intrusion detection/prevention) and smart network services to mitigate the impact of known or unknown threats.
– VPN (Virtual Private Network): A virtual private network allows secure (safe) computer connections to the corporate network system over the Internet. By combining hardware devices on the corporate network and specialized software on remote control computers, businesses can use VPNs for satellite offices, remote headquarters, and employee mobile devices.

* Hacker: Most hackers are knowledgeable about security and the principles of Internet and computer operation. In the past, hackers often breached computers for non-profit purposes, merely to showcase their skills or brag about their “achievements.” Today, this purpose has gradually disappeared, replaced by larger motives: money, personal grudges, politics… The concept and perception of hackers are quite diverse; however, they can be categorized into three types: white hats, black hats, and gray hats.
 
White hat hackers are often security experts who work for the common safety of the community in the fight against black hat hackers. Gray hats refer to hackers who possess both good and malicious characteristics, and their motives may shift depending on the circumstances.
 
* Cracker: These individuals are also very dangerous and cause significant harm to businesses. Their “favorite” activities include cracking software, modifying websites, stealing credit card information, and destroying data.
 
* Insider: This refers to employees within a company who seek to obtain personal information from others to satisfy curiosity or serve other purposes.
 
Common security threats include network attacks, social engineering attacks, viruses, worms, and spyware. Complex cyberattacks motivated by political or financial reasons typically target specific companies or computer systems. The intent is often to modify databases, steal accounts or personal information, and install spyware to allow the intruder to launch attacks from the victim’s computer system.
 
Cyberattacks can be categorized into three basic methods:
 
* Reconnaissance Attack: This is a method of gathering information to initiate a real subsequent attack on the network.
 
* Access Attack: This method exploits vulnerabilities in the network (often bugs or security loopholes).
 
* Denial of Service Attack: This is currently the most aggressive form of attack, sending a large number of information requests to a server, causing overload and making it difficult (or impossible) for external access to the computer.
 
System administrators must accurately assess the level of attacks to formulate appropriate countermeasures and protection.

– Virus: A program that can search for other programs on the network device and infect them by copying a version of the virus into them. When these programs are executed, the attached virus is also activated to begin the next infection cycle. Unlike worms, viruses cannot infect computers without some form of interaction (user intervention).

– Worm: A program that can self-propagate and spread across the network at a very rapid pace.

– Trojan Horse: Named after a phrase, this term refers to a dangerous program hidden within some other guise (such as a game program), allowing the perpetrator to remotely command the system.

The “social engineering” method is often used to steal sensitive information from businesses. This is one of the least labor-intensive yet highly effective attack methods in many cases. Sometimes, all it takes is a phone call for an attacker to obtain what they want, such as asking for password information to upgrade a system from the technical support department.
 
Viruses, Trojans, worms, and other threats can combine to create significant risks to a business’s safety. These threats typically target a predetermined objective, launched online to seek vulnerabilities in the victim’s computer systems to infiltrate. Viruses and Trojans often require user interaction to spread, whereas worms do not; they can self-propagate via email to infect “less secure” computer systems within hours or even minutes. According to statistics from the software security company PestPatrol, the number of security threats increased from 27,000 in 2000 to 60,500 in 2003.
 
* Solutions
 
To minimize damage from attacks exploiting security vulnerabilities, businesses must rigorously implement detection processes to thoroughly resolve or maximize prevention of these vulnerabilities. The first step is often to draft a security policy and disseminate it widely among employees. This policy should clearly state the rights and responsibilities of each individual when interacting with the company’s technical resources.
 
Once a clear policy and regulations are in place, the next step is to combine practical measures to minimize or even eliminate many current security “headaches.” These measures may include implementing techniques to detect and prevent abusive and destructive behaviors, training employees, and effectively applying the established security policy.
 
* Impact
 
Internet security can have a direct impact on a business’s revenue and operational status. A survey by CSI and the FBI’s Computer Intrusion Squad in 2003 found that among 75% of surveyed businesses, they believed they suffered financial losses due to security incidents; 47% of businesses reported they could accurately assess security damage; and 23% reported losses of around $10 million annually due to intrusion attacks.
 
Another form of damage, which is difficult to assess but extremely important for small and medium-sized businesses (SMBs), is the downtime and product losses due to slow responses to security incidents. In many cases, businesses must temporarily remove critical servers, desktop systems, and networks related to security incidents. Despite facing potential losses, many small businesses still do not prioritize this risk.
 
* Actions Needed
 
Security threats and the deployment of technology to mitigate them are always closely related. Successful security requires a comprehensive approach and processing protocol:
 
– Conduct regular assessments of the security policy
– Implement security technologies to provide secure connections, prevent threats, and manage identification and assessment at appropriate times and departments.
– Repair and protect endpoints, servers, and desktops from identified or unidentified threats. It is essential to understand that, in reality, there is no single perfect security technology; a combination of various measures and technologies is necessary.
 
There are many basic security steps that do not require significant money or effort. SMBs can take simple and easily applicable steps to improve their security environment. Although SMBs may be smaller targets, they are not attacked less frequently; on the contrary, these businesses need to protect themselves against threats by implementing common and easily deployable preventive measures.

To be continued…

Next Post
create cd emergency start 2497

Create a Bootable Emergency CD

ajax programming technique 2498

Ajax Programming Techniques

should remember mp3 format that quality does not decrease 2499

Compress MP3 format without losing quality

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

FEATURED POST

the mystery of the mummified woman misidentified as an egyptian pharaoh 129359

The Mystery of the Mummy of the Woman Mistaken for the Pharaoh of Egypt

space monsters in mythology first appearance 129358

Cosmic Monster ‘in Legend’ Appears for the First Time

the most dangerous coastline in the world haunting the dreams of mangrove forests 108247

The world’s most dangerous strait – The haunting toll measured in sailors’ lives

10 amazing natural phenomena that challenge science 60818

23 Mysterious Natural Phenomena That Challenge Science

TRENDING

nguoi ai cap co dai 650
Scientific Discoveries

What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

no cave no peak excluding china leaves the world amazed when building a bridge like a dragon flying over the river 136956
Scientific Discoveries

No Tunnels, No Supports: China Stuns the World with a Bridge that Floats like Silk on the River

10 amazing natural phenomena that challenge science 60818
1001 Mysteries

23 Mysterious Natural Phenomena That Challenge Science

10 most dangerous poisons in the world 70621
Plants

12 Most Dangerous Poisonous Mushrooms in the World

EDITOR PICK'S

What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

No Tunnels, No Supports: China Stuns the World with a Bridge that Floats like Silk on the River

23 Mysterious Natural Phenomena That Challenge Science

17 Causes of Throat Tightness and Belching

The best way to charge a newly purchased phone battery to avoid battery degradation

Grand Canyon, the mysterious area containing ancient Egyptian relics of the United States

20 Interesting Facts About Light You May Not Know

Newsletter

THE MOST IMPORTANT WORLD NEWS AND EVENTS OF THE DAY

Subscribe to our mailing list to receives daily updates direct to your inbox!

Category

  • 1001 Mysteries
  • AI – Artificial Intelligence
  • Aliens & UFOs
  • Animal World
  • Antibiotic Resistance
  • Archaeology
  • Bacteria & Insects
  • Biology
  • Biotechnology
  • Climate & Weather

Site Link

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

At Scimyst, we uncover the wonders of science, history, and culture. From ancient mysteries to modern innovations, our stories inspire curiosity and connect you to the fascinating world around us. Explore the unknown with us!

  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 Scimyst - Your gateway to the wonders of science and culture

No Result
View All Result
  • Home
  • Discoveries
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
      • Bacteria & Insects
      • Biotechnology
      • Plants
    • Doomsday
    • Famous Landmarks
    • History
      • This Day in History
    • Military Science
    • Mars Exploration
    • Oceanography
    • Science Q&A
    • Science Quiz
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
      • Cultural Heritage
      • Vietnamese Heritage
  • Technology
    • AI – Artificial Intelligence
    • Computer Science
    • New Technology
      • Self-Driving Cars
    • Scientific Inventions
  • Lifestyle
    • Cancer
    • Environment
      • Climate & Weather
      • Disasters
      • Latest Storm Updates
      • Nature
      • Solutions
    • Medicine & Health
      • Antibiotic Resistance
      • Common Illnesses
      • Dengue Fever
      • Family Medicine Cabinet
      • Food Safety
      • Health
      • Influenza Outbreak
    • Scientific Applications
  • Events
    • Science Events
    • Science Stories
    • Scientific Projects
  • Entertainment
    • Photo Library
    • Videos

© 2025 Scimyst - Your gateway to the wonders of science and culture