Scimyst
Subscribe
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

    isaac Newton1

    10 Famous Inventions of Isaac Newton

    Trending Tags

    • Events
      • All
      • Science Stories
      • Scientific Projects

      Tonight announces the Ig Nobel Prize winners

      frog

      Frog Wins Ig Nobel Prize 2005

      canhcutIg

      Life is Not Lacking in Quirks

      Nobel Prize in Medicine 2005: A Modern Fairy Tale

      10 Weird Inventions Awarded the Ig Nobel Prize 2005

      nobelKT

      Why Did They Win the Nobel Prize in Economics?

      giaydientu

      “Electronic Paper” Set to Appear on the Market

      Development of Science and Technology in the South Central Coast and Central Highlands Provinces

      a russian scientist loves vietnam 1659

      A Russian Scientist Who Loves Vietnam

    • Lifestyle
      • All
      • Environment
      • Medicine & Health
      tdnong

      Global warming may be the cause of major storms

      traxanh1

      Green tea has effects against dementia

      Discovery of Cancer-Preventing Genes in the Human Body

      Khachdulich Indonesia

      Avian influenza harms tourism more than terrorism

      nao

      Lying – A Disease of People with Brain Defects

      cafe

      Coffee May Prevent Cancer

      tebaocum

      Recreating the ‘Death’ Flu Virus of 1918

      Indo ban

      The whole world unites to fight avian influenza

      HIV aids

      The Mystery of AIDS Epidemic

      Trending Tags

      • Technology
        • All
        • AI - Artificial Intelligence
        • Computer Science
        • New Technology
        • Scientific Inventions
        top apps explore space solar system on pc 98000

        Top Applications for Exploring the Universe and Solar System on PC

        vai dien tu 650

        Soon there will be data-transmitting clothing

        sua loi khong vao dc coc coc 650

        Why can’t Cốc Cốc download videos to the computer?

        may tinh cu 1

        17 Things You Can Do with an Old Computer

        play free games super fun on android devices 54708

        Play Extremely Fun Free Games on Android Devices

        top 10 best weather apps on android 98127

        Top 10 Best Astronomy Apps on Android

        canh tay robot 650

        Robot system helps neutralize mines

        trang trai noi o rotterdam 650

        Modern Cities Combining Gardens and Cattle Farms

        city tree 650

        “High-tech” trees can purify polluted air

      • Cultural Heritage
        ai cap 650

        The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

        khao co 650

        Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

        baroque churches philippines 67188

        Baroque Churches – Philippines

        mont saint michel france 67265

        Mont Saint Michel Island – France

        acropolis bracelet in athens greece 67621

        Acropolis Fortress in Athens – Greece

        language mo tan thuy hoang china 67087

        Tomb of Qin Shi Huang – China

        historical city ayutthaya 67804

        Historical City of Ayutthaya

        historical city ayutthaya 67804 2

        Historic City of Ayutthaya

        mesa verde national park 67201

        Mesa Verde National Park – United States of America

        Trending Tags

        • Entertainment
          • All
          • Photo Library
          • Videos

          Honesty

          Telephone

          Advanced Technology

          Terminal Illness

          Allergy

          Love Like Mars

          Super Definition

          Coi Sách

          Selling Candy

        No Result
        View All Result
        Scimyst
        • Home
        • Discoveries
          • All
          • 1001 Mysteries
          • Aliens & UFOs
          • Animal World
          • Archaeology
          • Biology
          • Doomsday
          • Famous Landmarks
          • History
          • Mars Exploration
          • Military Science
          • Oceanography
          • Science Q&A
          • Scientific Discoveries
          • Space Science
          • Why
          • World Figures
          • World Wonders
          thanh pho trang 650

          The Lost City of 500 Years Containing Flesh-Eating Parasites

          creating the worlds first plasma lamp not using a wire just throw it away 133669

          Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

          which country suffers the most natural disasters in the world every year 136695

          Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

          strange spc exoplanet

          10 Most Strange Things of the Universe

          thuan tay trai 650

          Left-Handed People and 16 “Shocking” Facts

          cham do ben khoe mieng 650

          The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

          tinh van con cua 650

          Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

          cau hon o phap 650

          Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

          isaac Newton1

          10 Famous Inventions of Isaac Newton

          Trending Tags

          • Events
            • All
            • Science Stories
            • Scientific Projects

            Tonight announces the Ig Nobel Prize winners

            frog

            Frog Wins Ig Nobel Prize 2005

            canhcutIg

            Life is Not Lacking in Quirks

            Nobel Prize in Medicine 2005: A Modern Fairy Tale

            10 Weird Inventions Awarded the Ig Nobel Prize 2005

            nobelKT

            Why Did They Win the Nobel Prize in Economics?

            giaydientu

            “Electronic Paper” Set to Appear on the Market

            Development of Science and Technology in the South Central Coast and Central Highlands Provinces

            a russian scientist loves vietnam 1659

            A Russian Scientist Who Loves Vietnam

          • Lifestyle
            • All
            • Environment
            • Medicine & Health
            tdnong

            Global warming may be the cause of major storms

            traxanh1

            Green tea has effects against dementia

            Discovery of Cancer-Preventing Genes in the Human Body

            Khachdulich Indonesia

            Avian influenza harms tourism more than terrorism

            nao

            Lying – A Disease of People with Brain Defects

            cafe

            Coffee May Prevent Cancer

            tebaocum

            Recreating the ‘Death’ Flu Virus of 1918

            Indo ban

            The whole world unites to fight avian influenza

            HIV aids

            The Mystery of AIDS Epidemic

            Trending Tags

            • Technology
              • All
              • AI - Artificial Intelligence
              • Computer Science
              • New Technology
              • Scientific Inventions
              top apps explore space solar system on pc 98000

              Top Applications for Exploring the Universe and Solar System on PC

              vai dien tu 650

              Soon there will be data-transmitting clothing

              sua loi khong vao dc coc coc 650

              Why can’t Cốc Cốc download videos to the computer?

              may tinh cu 1

              17 Things You Can Do with an Old Computer

              play free games super fun on android devices 54708

              Play Extremely Fun Free Games on Android Devices

              top 10 best weather apps on android 98127

              Top 10 Best Astronomy Apps on Android

              canh tay robot 650

              Robot system helps neutralize mines

              trang trai noi o rotterdam 650

              Modern Cities Combining Gardens and Cattle Farms

              city tree 650

              “High-tech” trees can purify polluted air

            • Cultural Heritage
              ai cap 650

              The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

              khao co 650

              Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

              baroque churches philippines 67188

              Baroque Churches – Philippines

              mont saint michel france 67265

              Mont Saint Michel Island – France

              acropolis bracelet in athens greece 67621

              Acropolis Fortress in Athens – Greece

              language mo tan thuy hoang china 67087

              Tomb of Qin Shi Huang – China

              historical city ayutthaya 67804

              Historical City of Ayutthaya

              historical city ayutthaya 67804 2

              Historic City of Ayutthaya

              mesa verde national park 67201

              Mesa Verde National Park – United States of America

              Trending Tags

              • Entertainment
                • All
                • Photo Library
                • Videos

                Honesty

                Telephone

                Advanced Technology

                Terminal Illness

                Allergy

                Love Like Mars

                Super Definition

                Coi Sách

                Selling Candy

              No Result
              View All Result
              Scimyst
              No Result
              View All Result
              Home Technology Computer Science

              Network Security and What You Need to Know

              by Sci
              December 30, 2005
              in Computer Science
              0
              Share on FacebookShare on Twitter

              firewallWhile network and Internet technologies provide numerous growth and competitive opportunities for small and medium-sized businesses (SMBs), they also raise the urgent need to protect computer systems against security threats.
               
              According to a survey conducted by the Computer Security Institute (CSI) in 2003, as much as 78% of computers were attacked through the Internet (up from 59% in 2000). Today, even the smallest businesses feel compelled to engage in online activities, bringing several factors that must be ensured for this model.
               
              However, according to Jim Browning, Vice President and Director of SMB Research at Gartner, most businesses do not adequately recognize the importance of security; they often overlook it when it should be a top priority for online operations.
               
              If not properly protected, every part of a network system becomes a target for hackers, competitors, or even employees within the company. Although in 2005, 40% of SMBs implemented security network management and increased their Internet usage, Gartner’s statistics show that more than half of them were even unaware that they were being attacked by hackers.
               
              Fundamental Platforms
               
              Like many other types of crime, network threats and Internet resources originate from a small community. Despite their small numbers, these factors continue to grow as there are few effective regulations to restrain them; merely one attack tool disseminated online can immediately target numerous computer systems through software vulnerabilities. Those behind these attacks can be hackers, software crackers, or “insiders.”

              – Access Control: This involves verifying identity and deciding whether to grant access to the network. Authentication may be through passwords or more complex measures like biometric devices (fingerprint or facial recognition).
              – Firewall: A software or hardware solution that helps prevent unauthorized access attempts from the outside or only allows legitimate data to enter the network. Nowadays, firewalls are widely used in corporate network systems.
              – Identity Management: Identifying users and their current acceptance status, defining and enforcing access rights to system and network resources.
              – Intrusion Detection: The capability of software to analyze network activity, detect intrusion behavior, and notify administrators.
              – Threat Prevention: The integration of multiple security technologies (firewalls, intrusion detection/prevention) and smart network services to mitigate the impact of known or unknown threats.
              – VPN (Virtual Private Network): A virtual private network allows secure (safe) computer connections to the corporate network system over the Internet. By combining hardware devices on the corporate network and specialized software on remote control computers, businesses can use VPNs for satellite offices, remote headquarters, and employee mobile devices.

              * Hacker: Most hackers are knowledgeable about security and the principles of Internet and computer operation. In the past, hackers often breached computers for non-profit purposes, merely to showcase their skills or brag about their “achievements.” Today, this purpose has gradually disappeared, replaced by larger motives: money, personal grudges, politics… The concept and perception of hackers are quite diverse; however, they can be categorized into three types: white hats, black hats, and gray hats.
               
              White hat hackers are often security experts who work for the common safety of the community in the fight against black hat hackers. Gray hats refer to hackers who possess both good and malicious characteristics, and their motives may shift depending on the circumstances.
               
              * Cracker: These individuals are also very dangerous and cause significant harm to businesses. Their “favorite” activities include cracking software, modifying websites, stealing credit card information, and destroying data.
               
              * Insider: This refers to employees within a company who seek to obtain personal information from others to satisfy curiosity or serve other purposes.
               
              Common security threats include network attacks, social engineering attacks, viruses, worms, and spyware. Complex cyberattacks motivated by political or financial reasons typically target specific companies or computer systems. The intent is often to modify databases, steal accounts or personal information, and install spyware to allow the intruder to launch attacks from the victim’s computer system.
               
              Cyberattacks can be categorized into three basic methods:
               
              * Reconnaissance Attack: This is a method of gathering information to initiate a real subsequent attack on the network.
               
              * Access Attack: This method exploits vulnerabilities in the network (often bugs or security loopholes).
               
              * Denial of Service Attack: This is currently the most aggressive form of attack, sending a large number of information requests to a server, causing overload and making it difficult (or impossible) for external access to the computer.
               
              System administrators must accurately assess the level of attacks to formulate appropriate countermeasures and protection.

              – Virus: A program that can search for other programs on the network device and infect them by copying a version of the virus into them. When these programs are executed, the attached virus is also activated to begin the next infection cycle. Unlike worms, viruses cannot infect computers without some form of interaction (user intervention).

              – Worm: A program that can self-propagate and spread across the network at a very rapid pace.

              – Trojan Horse: Named after a phrase, this term refers to a dangerous program hidden within some other guise (such as a game program), allowing the perpetrator to remotely command the system.

              The “social engineering” method is often used to steal sensitive information from businesses. This is one of the least labor-intensive yet highly effective attack methods in many cases. Sometimes, all it takes is a phone call for an attacker to obtain what they want, such as asking for password information to upgrade a system from the technical support department.
               
              Viruses, Trojans, worms, and other threats can combine to create significant risks to a business’s safety. These threats typically target a predetermined objective, launched online to seek vulnerabilities in the victim’s computer systems to infiltrate. Viruses and Trojans often require user interaction to spread, whereas worms do not; they can self-propagate via email to infect “less secure” computer systems within hours or even minutes. According to statistics from the software security company PestPatrol, the number of security threats increased from 27,000 in 2000 to 60,500 in 2003.
               
              * Solutions
               
              To minimize damage from attacks exploiting security vulnerabilities, businesses must rigorously implement detection processes to thoroughly resolve or maximize prevention of these vulnerabilities. The first step is often to draft a security policy and disseminate it widely among employees. This policy should clearly state the rights and responsibilities of each individual when interacting with the company’s technical resources.
               
              Once a clear policy and regulations are in place, the next step is to combine practical measures to minimize or even eliminate many current security “headaches.” These measures may include implementing techniques to detect and prevent abusive and destructive behaviors, training employees, and effectively applying the established security policy.
               
              * Impact
               
              Internet security can have a direct impact on a business’s revenue and operational status. A survey by CSI and the FBI’s Computer Intrusion Squad in 2003 found that among 75% of surveyed businesses, they believed they suffered financial losses due to security incidents; 47% of businesses reported they could accurately assess security damage; and 23% reported losses of around $10 million annually due to intrusion attacks.
               
              Another form of damage, which is difficult to assess but extremely important for small and medium-sized businesses (SMBs), is the downtime and product losses due to slow responses to security incidents. In many cases, businesses must temporarily remove critical servers, desktop systems, and networks related to security incidents. Despite facing potential losses, many small businesses still do not prioritize this risk.
               
              * Actions Needed
               
              Security threats and the deployment of technology to mitigate them are always closely related. Successful security requires a comprehensive approach and processing protocol:
               
              – Conduct regular assessments of the security policy
              – Implement security technologies to provide secure connections, prevent threats, and manage identification and assessment at appropriate times and departments.
              – Repair and protect endpoints, servers, and desktops from identified or unidentified threats. It is essential to understand that, in reality, there is no single perfect security technology; a combination of various measures and technologies is necessary.
               
              There are many basic security steps that do not require significant money or effort. SMBs can take simple and easily applicable steps to improve their security environment. Although SMBs may be smaller targets, they are not attacked less frequently; on the contrary, these businesses need to protect themselves against threats by implementing common and easily deployable preventive measures.

              To be continued…

              Next Post
              create cd emergency start 2497

              Create a Bootable Emergency CD

              ajax programming technique 2498

              Ajax Programming Techniques

              should remember mp3 format that quality does not decrease 2499

              Compress MP3 format without losing quality

              Leave a Reply Cancel reply

              Your email address will not be published. Required fields are marked *

              FEATURED POST

              the mystery of the mummified woman misidentified as an egyptian pharaoh 129359

              The Mystery of the Mummy of the Woman Mistaken for the Pharaoh of Egypt

              space monsters in mythology first appearance 129358

              Cosmic Monster ‘in Legend’ Appears for the First Time

              the most dangerous coastline in the world haunting the dreams of mangrove forests 108247

              The world’s most dangerous strait – The haunting toll measured in sailors’ lives

              10 amazing natural phenomena that challenge science 60818

              23 Mysterious Natural Phenomena That Challenge Science

              TRENDING

              why is israel considered the smallest superpower in the world 129258
              Why

              Why is Israel considered the smallest superpower in the world?

              the truth about the 300 year old swan raising in siberia 137566
              Archaeology

              The truth about the 2,300-year-old stuffed swan in Siberia

              what happens when you dont eat rice for a month 131509
              Lifestyle

              What Happens When You Don’t Eat Rice for a Month?

              should and should not eat when having a fever 132107
              Lifestyle

              What to Eat and What Not to Eat When Having a Fever?

              EDITOR PICK'S

              What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

              Why is sea ice pure like freshwater while the ocean is salty?

              Why is Israel considered the smallest superpower in the world?

              14 Most Powerful Military Forces in Ancient World History

              NASA reveals the reason why the entire Starlink satellite “fleet” was dropped

              17 Causes of Throat Tightness and Belching

              What are the effects and harms of drinking water made from perilla leaves on health?

              Newsletter

              THE MOST IMPORTANT WORLD NEWS AND EVENTS OF THE DAY

              Subscribe to our mailing list to receives daily updates direct to your inbox!

              Category

              • 1001 Mysteries
              • AI – Artificial Intelligence
              • Aliens & UFOs
              • Animal World
              • Antibiotic Resistance
              • Archaeology
              • Bacteria & Insects
              • Biology
              • Biotechnology
              • Climate & Weather

              Site Link

              • Log in
              • Entries feed
              • Comments feed
              • WordPress.org

              About Us

              At Scimyst, we uncover the wonders of science, history, and culture. From ancient mysteries to modern innovations, our stories inspire curiosity and connect you to the fascinating world around us. Explore the unknown with us!

              • About
              • Advertise
              • Privacy & Policy
              • Contact

              © 2025 Scimyst - Your gateway to the wonders of science and culture

              No Result
              View All Result
              • Home
              • Discoveries
                • 1001 Mysteries
                • Aliens & UFOs
                • Animal World
                • Archaeology
                • Biology
                  • Bacteria & Insects
                  • Biotechnology
                  • Plants
                • Doomsday
                • Famous Landmarks
                • History
                  • This Day in History
                • Military Science
                • Mars Exploration
                • Oceanography
                • Science Q&A
                • Science Quiz
                • Scientific Discoveries
                • Space Science
                • Why
                • World Figures
                • World Wonders
                  • Cultural Heritage
                  • Vietnamese Heritage
              • Technology
                • AI – Artificial Intelligence
                • Computer Science
                • New Technology
                  • Self-Driving Cars
                • Scientific Inventions
              • Lifestyle
                • Cancer
                • Environment
                  • Climate & Weather
                  • Disasters
                  • Latest Storm Updates
                  • Nature
                  • Solutions
                • Medicine & Health
                  • Antibiotic Resistance
                  • Common Illnesses
                  • Dengue Fever
                  • Family Medicine Cabinet
                  • Food Safety
                  • Health
                  • Influenza Outbreak
                • Scientific Applications
              • Events
                • Science Events
                • Science Stories
                • Scientific Projects
              • Entertainment
                • Photo Library
                • Videos

              © 2025 Scimyst - Your gateway to the wonders of science and culture