logo

Internet-Based Applications and Security Concerns

   

Added on  2019-10-18

8 Pages1182 Words470 Views
Running Head: Internet-Based ApplicationsInternet BasedApplications

Internet Based Applications2Table of ContentsAnswer 1..........................................................................................................................................2Answer 2..........................................................................................................................................3Answer 3..........................................................................................................................................4References........................................................................................................................................6

Internet Based Applications3Answer 1Generally, it can be said that all national infrastructures mainly depend on the underlying communication of computer information infrastructures like private networks, the internet, computing resources, and the databases. All these underlying information infrastructures and the infrastructures are covered with reliability and system survivability flaws, vulnerabilities, representing security, and the potential attacks that can influence the software, hardware, lives ofpeople, and the communications media. Furthermore, it can be said that security concerns are significant, but it must also be considered that the networks and the systems tend to fall apart on their own, without requiring attacks of malicious.On the other hand, it can be significantly said that the public infrastructure like internet brings a large number of risks and difficulties associated with the security as well as physical damage. Reliability glitches and the high-security flaws are common in most of the networks, programming languages, web software, and the systems (Bradshaw, 2016). It can be said that theextent of the available risk cannot recognize in an effective manner due to the presence of enough complexities associated with the public network. Another risk and difficulty associated with the use of the public internet are the presence of unforeseen vulnerabilities. These vulnerabilities damage the hardware and software parts of a system in a greater manner. Apart of all these, there are a much realistic threat to the information infrastructures, containing incompetent operational and administrative staff, terrorists, intruders, and malicious insiders. Malicious attacks can come from anywhere in the world and brings huge effects with it. It destroys all dial-up and network connections in a negative manner. Thus, it can be said that thereare few truly serious malicious attacks on networking and computer systems that influence the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CRYPTOGRAPHY AND SECURITY VULNERABILITIES OF SYSTEMS
|12
|794
|21

IT-373 - Report on IT Security
|11
|2410
|51

Host and Network Security
|19
|4301
|362

Linux Operating System Assignment
|5
|1295
|611

(PDF) Control of Distributed Systems: Tutorial and Overview
|7
|1025
|55

CVE-2017-0144 Vulnerability
|4
|666
|199