Every network and system has some loop holes and weaknesses so the intruders tries to get in to that network and hack the system. Network has so many weaknesses some of them are Operating system weakness, configuration weakness, technology weakness. - Coming to the vulnerabilities factors the intrudors or hacklers tries to find the weak spot in the network or device and tries to get in to that system. There are operating systems like UNIX, LINUX, Windows all these operating systems have some loop holes, these loop holes must be rectified. Passwords must be very typical that they would not have a chance of guessing that one. Every networks runs with some protocols. some of them are http, ftp, icmp. These are less insecure so these protocols must be secured properly. - Coming to the threats these are nothing but hackers and crackers that try to get in to that network and change the data. There atr several trypes of threats like hackers, crackers, phisher etc., The hackers try to get in to the network through a unauthorizes access and get the system in his control and the cracker gets in to the network through by sending some different viruses and gets the access over the network o0r system. Pischer in the sense they send so many mails which is not useful to us when we open to them we might effect with the viruses and this is one type of threat to the system. Solution Every network and system has some loop holes and weaknesses so the intruders tries to get in to that network and hack the system. Network has so many weaknesses some of them are Operating system weakness, configuration weakness, technology weakness. - Coming to the vulnerabilities factors the intrudors or hacklers tries to find the weak spot in the network or device and tries to get in to that system. There are operating systems like UNIX, LINUX, Windows all these operating systems have some loop holes, these loop holes must be rectified. Passwords must be very typical that they would not have a chance of guessing that one. Every networks runs with some protocols. some of them are http, ftp, icmp. These are less insecure so these protocols must be secured properly. - Coming to the threats these are nothing but hackers and crackers that try to get in to that network and change the data. There atr several trypes of threats like hackers, crackers, phisher etc., The hackers try to get in to the network through a unauthorizes access and get the system in his control and the cracker gets in to the network through by sending some different viruses and gets the access over the network o0r system. Pischer in the sense they send so many mails which is not useful to us when we open to them we might effect with the viruses and this is one type of threat to the system..