Threats : A Brief Overview
Posted by Harisinh | Posted in | Posted on 1:29 AM
-
Computer systems are vulnerable to many threats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centers. Losses can stem, for example, from the actions of supposedly trusted employees defrauding a system, from outside hackers, or from careless data entry clerks.
Precision in estimating computer security-related losses is not possible because many losses are never discovered, and others are "swept under the carpet" to avoid unfavorable publicity. The effects of various threats varies considerably: some affect the confidentiality or integrity of data while others affect the availability of a system. This chapter presents a broad view of the risky environment in which systems operate today.
The threats and associated losses presented in this chapter were selected based on their prevalence andsignificance in the current computing environment and their expected growth. This list is not exhaustive, and some threats may combine elements from more than one area.
This overview of 19 many of today's common threats may prove useful to organizations studying their own threat environments; however, the perspective of this chapter is very broad. Thus, threats against particular systems could be quite different from those discussed here.
20 To control the risks of operating an information system, managers and users need to know the vulnerabilities of the system and the threats that may exploit them. Knowledge of the threat.
21 environment allows the system manager to implement the most cost-effective security measures. In some cases, managers may find it more cost-effective to simply tolerate the expected osses. Such decisions should be based on the results of a risk analysis
I am discussing all about the treads now.
Enjoy.....
Computer systems are vulnerable to many threats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centers. Losses can stem, for example, from the actions of supposedly trusted employees defrauding a system, from outside hackers, or from careless data entry clerks.
Precision in estimating computer security-related losses is not possible because many losses are never discovered, and others are "swept under the carpet" to avoid unfavorable publicity. The effects of various threats varies considerably: some affect the confidentiality or integrity of data while others affect the availability of a system. This chapter presents a broad view of the risky environment in which systems operate today.
The threats and associated losses presented in this chapter were selected based on their prevalence andsignificance in the current computing environment and their expected growth. This list is not exhaustive, and some threats may combine elements from more than one area.
This overview of 19 many of today's common threats may prove useful to organizations studying their own threat environments; however, the perspective of this chapter is very broad. Thus, threats against particular systems could be quite different from those discussed here.
20 To control the risks of operating an information system, managers and users need to know the vulnerabilities of the system and the threats that may exploit them. Knowledge of the threat.
21 environment allows the system manager to implement the most cost-effective security measures. In some cases, managers may find it more cost-effective to simply tolerate the expected osses. Such decisions should be based on the results of a risk analysis
I am discussing all about the treads now.
Enjoy.....
Comments (0)
Post a Comment