0 evaluări0% au considerat acest document util (0 voturi)
46 vizualizări10 pagini
The document defines threat as any potential danger posed by people or objects through harmful behavior or attack against an asset. It lists several types of threats including human error, software attacks like malware, natural disasters, and different kinds of cyber attacks such as password cracking, backdoors, spam, and malicious code.
Descriere originală:
Titlu original
COMPUTER AND NETWORK SECURITY THREATS AND TECHNIQUE.pptx
The document defines threat as any potential danger posed by people or objects through harmful behavior or attack against an asset. It lists several types of threats including human error, software attacks like malware, natural disasters, and different kinds of cyber attacks such as password cracking, backdoors, spam, and malicious code.
The document defines threat as any potential danger posed by people or objects through harmful behavior or attack against an asset. It lists several types of threats including human error, software attacks like malware, natural disasters, and different kinds of cyber attacks such as password cracking, backdoors, spam, and malicious code.
POTENTIAL DANGER TO AN ASSET VIA ATTACK OR ANY TYPE OF HARMFUL BEHAVIOUR. ACT OF HUMAN FAILURE AND ERROR
• WRONG ASSUMPTION • IMPROPER TRAINING • INEXPERIENCE SOFTWARE ATTACK
• MALICIOUS SOFTWARE (MALWARE) DESIGNED TO DAMAGE, DESTROY,
OR DENY SERVICE TO TARGET SYSTEMS
• INCLUDES VIRUSES, WORMS, TROJAN HORSES, LOGIC
• BOMBS, BACK DOORS, AND DENIAL-OF-SERVICE ATTACKS
FORCES OF NATURE
• Individual lives are disrupted, other than storage, transmission,
and use of information • Organizations must implement controls to limit damage and prepare contingency plans for continued operations WHAT IS ATTACKS??
• A deliberate act that exploits vulnerability
STALLING MALICIOUS CODE
• Includes execution of viruses, worms, Trojan horses, and active
Web scripts with intent to destroy or steal information
BACKDOOR
• Gaining access to system or network using known or previously
Researching Internet-Based Populations - Advantages and Disadvantages of Online Survey Research, Online Questionnaire Authoring Software Packages, and Web Survey Services