Threads and attacks-information security, Computer Network Security

THREADS AND ATTACKS

Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management should be informed of the several threats facing the organization. By examining each and every threat category, management protects information effectively through policy, training, and technology controls.

The categorization of thread scheme is shown in the Table given below which consists of 12 general categories which represent a clear and present threat to an organization’s people, information, and systems.

 

           358_THREADS AND ATTACKS.png

 

Attack is act or action which exploits vulnerability (that is, an identified weakness) in controlled system. The following basic types of attacks

Posted Date: 10/8/2012 5:36:46 AM | Location : United States







Related Discussions:- Threads and attacks-information security, Assignment Help, Ask Question on Threads and attacks-information security, Get Answer, Expert's Help, Threads and attacks-information security Discussions

Write discussion on Threads and attacks-information security
Your posts are moderated
Related Questions
A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti