Paper details:The first PC virus was detected in 1986. Earlier viruses during the 1980s and 1990s were easily detectable and less malicious than today’s viruses. Today organised criminals are responsible for most of the threats against networked systems. There are a variety of different ways criminals can attack a networked system. In this Discussion, you will analyse the security issues associated with networked systems. You will also suggest measures to overcome these security threats and prevent future attacks.
To prepare for this Discussion:

• Review your weekly Learning Resources with a focus on networked systems and security threats.
• Watch the TED Talk video, ‘All your devices can be hacked’.
• Research additional security threats to computer networks as needed.
• Reflect on how you could prevent security threats to a network.

To complete this Discussion:
Post: Create an initial post in which you analyse the security issues associated with networked systems. Address the following:

• Analyse the security vulnerabilities commonly associated with network systems.
• Summarise each vulnerability and explain why it is a threat.
• Recommend methods to prevent exploitations of these security vulnerabilities and prevent security attacks.
• Fully state and justify any choices, assumptions or claims that you make using the suggested resources for this week and/or your own research.
Learning Resources :

Laureate Education, (2014) Computer Networks: Week 6 Lecture Notes [Video, Online], (accessed: 11/06/14)

Brookshear, G. (2011) Computer science: An overview. 11th Ed. Boston: Addison Wesley/Pearson.
• Chapter 4, ‘Networking and the Internet’
• Section 4.1, ‘Network Fundamentals’
• Section 4.2, ‘The Internet’
• Section 4.3, ‘The World Wide Web’
• Section 4.5, ‘Security’

Rubin, A. (2012) ‘All your devices can be hacked’, TED [Online]. Available from: (Accessed: 10 March 2014).
Dodge, M. (2007) An atlas of cyberspaces [Online]. Available from:, (Accessed: 26 April 2014).
This is a website dedicated to mapping and creating images of network traffic.

Goertzel, B. (1999) ‘Chapter 1: The network is the computer is the mind’. In: Wild computing [Online]. Available from:, (Accessed: 26 April 2014)
This article presents the network as the computer

Kurose, J.F. & Ross, K.W. (2010) Computer networking: A top-down approach. 5th ed. Boston, Massachusetts: Addison Wesley. ISBN: 978-0-13-607967-5

The World Wide Web Consortium (2014) W3C website [Online]. Available from:, (Accessed: 26 April 2014).
The W3C website provides resources for World Wide Web protocols and guidelines for an international community.

"Are you looking for this answer? We can Help click Order Now"