Threads and attacks-information security, Computer Network Security

THREADS AND ATTACKS

Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management should be informed of the several threats facing the organization. By examining each and every threat category, management protects information effectively through policy, training, and technology controls.

The categorization of thread scheme is shown in the Table given below which consists of 12 general categories which represent a clear and present threat to an organization’s people, information, and systems.

 

           358_THREADS AND ATTACKS.png

 

Attack is act or action which exploits vulnerability (that is, an identified weakness) in controlled system. The following basic types of attacks

Posted Date: 10/8/2012 5:36:46 AM | Location : United States







Related Discussions:- Threads and attacks-information security, Assignment Help, Ask Question on Threads and attacks-information security, Get Answer, Expert's Help, Threads and attacks-information security Discussions

Write discussion on Threads and attacks-information security
Your posts are moderated
Related Questions
INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

on LAN,where are IP datagrams transported?

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

What is one-time pad for encryption?  Describe how it offers both Confusion and Diffusion. Using the letter encoding discussed in class (along with one-time

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

implementing password policy in organisation

how to link html with a data base