What are the internal threats - security, Computer Networking

What are the Internal Threats

Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can change their tune and turn malicious, wreaking havoc on the computing environment.

By thoroughly scrutinising the workers' backgrounds, references, and previous employers carefully, and changing and auditing security methods, especially observation of the work pattern or behaviour of the employees (maybe on a day-today basis), it would be possible to know about the possibilities of internal threats beforehand. Still further, this information would be useful to track down the line easily when any attack takes place.


Posted Date: 9/27/2013 2:59:01 AM | Location : United States

Related Discussions:- What are the internal threats - security, Assignment Help, Ask Question on What are the internal threats - security, Get Answer, Expert's Help, What are the internal threats - security Discussions

Write discussion on What are the internal threats - security
Your posts are moderated
Related Questions
Define the term - frame and packets Frames sum up packets. When a packet arrives at data link layer, the complete packet, header, data and remaining all, is used as data field

Connection Establishment TCP transmits  data in full duplex mode. When two TCP is two machines are  connected they are able  to send segments to each other simultaneously. This

NETWORK MANAGEMENT & SECURITY 1. Describe a basic communication model. 2. State the following terms: a. Configuration Management b. Fault Management c. Security Management

What is Groupware Groupware are a collection of software tools that encompass a broad range of applications. Even though groupware broadly consists of applications like calend

Name the OSI layer which performs code conversion, code formatting and encryption Ans) Presentation layer performs code conversion, code formatting and encryption

Q. Show the Network Layer Responsibilities? - Source-to-destination delivery it is possibly across multiple networks - Logical addressing - Routing

To model a WAN, we need a graph in which the nodes model switches and the edges model direct join between switches. The modeling saves essence of network, and it ignores attached d

Short for Internet Message Access Protocol. This is another most prevalent protocol of internet standard for email usage apart from POP. Usually all the modern email server and cli

Describe in proper details about OSI Model ? Explain the functions and protocols and services of each layer ?