Open In App

Vulnerabilites in Computer System Security

Last Updated : 07 May, 2023
Improve
Improve
Like Article
Like
Save
Share
Report

For computer system security technology there are various parameters and applications in such a way that are used in order to benefit the authorized user. The term vulnerability means flaws or errors that are present in the system due to which the information can be extracted by an unauthorized person. Therefore, being a user we need to use the technology rather not to miss using the technology for financial benefit.

Classification of Vulnerabilities

1. Certified Ethical Hacker

Those certified people who are dedicated to extracting any information in consent with standard authorities for the purpose of business or any other application are called certified ethical hackers. But on the other hand, there are large numbers of people who start extracting this relevant information illegally and they misuse it.

2. Virus and Identification

The situation when some software or program is downloaded, at that time the virus enters the devices and changes its property in accordance with the attacker’s requirement. So, that the attacker can easily extract any data from the device whenever he requires it. Therefore, standard antivirus is needed for protecting the devices.

3. System Security

When the devices with their hardware, software, database, and memory are protected in all respect. So, there’s no chance of leakage of information unwantedly.

4. Global Security

When the different system servers are connected to different clients systems are protected in such a way that there’s no possibility of an unauthorized excess in the entire network using the internet.

5. Cloud Computing

When the main objective is to protect the entire global database called a cloud by any means then as a result, the connected network and devices are automatically protected.

6. Multi-level Authentication

In computer system security technology the objective is to protect or prevent the unwanted access of relevant information for which it is advice-able to use multiple levels of security where level one can be secret code level two can be fingerprint identification, level three can be retina scanning due to which the entire system will be very difficult to be hacked by the attacker.Therefore, these vulnerabilities need to be taken care of whenever several application is used.


Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads