Introduction
Networks and computer systems are imperative to establishments in the present age. They have managed to simplify sending and receiving of information and colossal data processing over very short time periods. However, they are always facing threats and attacks from hackers. Dangers to the computing environment, network, and the database comes from everywhere. In such a high stake facility, it is critical to ensure that the main threats are identified and mitigated. The major threats can come from three areas: the physical installation, the users, and malicious attacks. The five top threats to the new network will be the ...