Abstract

Due to the constant increase of information in different areas and the evolving of applications and equipment, the number of vulnerabilities the systems encounter also rises exponentially. The information systems are known as an important part of every organization. As a result, they have to be secure and reliable to the users. There are ways for unauthorized people to access sensitive information. In this paper will discuss about the types of possible vulnerabilities and how they influence the security of information system. Also, methods to prevent attack due to the vulnerabilities will be presented.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call