Threads and attacks-information security, Computer Network Security

THREADS AND ATTACKS

Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management should be informed of the several threats facing the organization. By examining each and every threat category, management protects information effectively through policy, training, and technology controls.

The categorization of thread scheme is shown in the Table given below which consists of 12 general categories which represent a clear and present threat to an organization’s people, information, and systems.

 

           358_THREADS AND ATTACKS.png

 

Attack is act or action which exploits vulnerability (that is, an identified weakness) in controlled system. The following basic types of attacks

Posted Date: 10/8/2012 5:36:46 AM | Location : United States







Related Discussions:- Threads and attacks-information security, Assignment Help, Ask Question on Threads and attacks-information security, Get Answer, Expert's Help, Threads and attacks-information security Discussions

Write discussion on Threads and attacks-information security
Your posts are moderated
Related Questions
what is hacking

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

LOCAL TALK Apple discovered the LAN technology that uses bus topology. Its interface is added with all Macintosh computers. It has very low speed i.e. 230.4Kbps. Also it is ch

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

Question: (a) Explain the following terms: Information Communication Technology, Operating System and Application Software. (b) Define what a computer is, give four anatomi

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these

every time i connect to WIFI the UC goes directly to 100% then i doesn''t want to come down. what shall i do ?

QUESTION a) A switch basically operates by forwarding frames from one part of the network to another, based on MAC address. Describe the three types of switching namely store