Security Threats consisting of 1) User created breach 2) Password Cracking 3) Trojan horse 4) Denial of Service 5) Packets Sniffers 6) IP spoofing 7) System snooping
Users may unknowingly create a security risk by using weak passwords, or by downloading a file containing a virus.
Password cracking
Dictionary programs specifically written to break into a password-protected system are frequently used to gain access to network systems.
Trojan horse
Users can inadvertently download destructive viruses and Trojan horses thereby compromising your network's ability to function.
Denial of service
To prevent legitimate users of a service from using that service, attackers may attempt to flood a network, or disrupt connections or services.
Packet sniffer
Sniffers, devices or programs that are used to monitor traffic on a network can be installed anywhere in a networked system.
IP spoofing
Many hackers can imitate any Internet Protocol (IP) device that has an IP address that allows them entrance into your system.
System snooping
Using Transmission Control Protocol/Internet Protocol (TCP/IP), a hacker can enter your system through device that does not have specific security mechanisms in place.