Threads and attacks-information security, Computer Network Security


Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management should be informed of the several threats facing the organization. By examining each and every threat category, management protects information effectively through policy, training, and technology controls.

The categorization of thread scheme is shown in the Table given below which consists of 12 general categories which represent a clear and present threat to an organization’s people, information, and systems.


           358_THREADS AND ATTACKS.png


Attack is act or action which exploits vulnerability (that is, an identified weakness) in controlled system. The following basic types of attacks

Posted Date: 10/8/2012 5:36:46 AM | Location : United States

Related Discussions:- Threads and attacks-information security, Assignment Help, Ask Question on Threads and attacks-information security, Get Answer, Expert's Help, Threads and attacks-information security Discussions

Write discussion on Threads and attacks-information security
Your posts are moderated
Related Questions
Question: (a) State the strong law of large numbers. (b) Data have been collected on response times (in minutes) at a fire station. The data are 2:7 1:8 0:8 1:4 1:2 (i

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

How much would it cost to have a project completed by tomorrow night?

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

Techniques for combating Spam mails Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to

Packet Filtering Firewall Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interco

Internet Protocol IP Gives computer-to-computer communication. Host and receiver addresses are computers. This is also known machine-to-machine communication.

Border Gateway Protocol It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •    Apply safeguards wh

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm