Threads and attacks-information security, Computer Network Security

THREADS AND ATTACKS

Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management should be informed of the several threats facing the organization. By examining each and every threat category, management protects information effectively through policy, training, and technology controls.

The categorization of thread scheme is shown in the Table given below which consists of 12 general categories which represent a clear and present threat to an organization’s people, information, and systems.

 

           358_THREADS AND ATTACKS.png

 

Attack is act or action which exploits vulnerability (that is, an identified weakness) in controlled system. The following basic types of attacks

Posted Date: 10/8/2012 5:36:46 AM | Location : United States







Related Discussions:- Threads and attacks-information security, Assignment Help, Ask Question on Threads and attacks-information security, Get Answer, Expert's Help, Threads and attacks-information security Discussions

Write discussion on Threads and attacks-information security
Your posts are moderated
Related Questions
What are the main differences between TCP/IP vs OSI?

Question: (a) Explain and illustrate with a drawing the three-layer feedforward multilayer perceptron neural network. (b) Summarize the standard backpropagation algorithm in

SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (

Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

BUSINESS NEEDS Information security performs four main functions for an organization. 1. Protects the ability of organization to function. 2. Enables safe operation of applicat

Listing Assets in Order of Importance Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated usin

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects: Criticality level Impact in