Professional Documents
Culture Documents
Chapter 2
Chapter 2
information security
fourth stage
chapter two
threats .2
Category of threat Examples
compromise to .1 Piracy ,copyright ,
intellectual property infringement
in organizations that rely heavily on the internet and the world wide web
to support continued operations ,internet service provider failures can
considerably undermine the availability of information. many
organizations have sales staff and telecommuters working at remote
locations .when this of offsite employees can not contact the host
systems ,they must use manual procedures to continue operations .when
an organization places its web servers in the care of a web hosting
provider, that provides assumes responsibility for all internet services as
well as for the hardware and operating system software used to operate
the website. this web hosting service are usually arranged with an
agreement providing minimum services level known as a service level
agreement (SLA) when a service provider failed to meet the SLA the
provider may accrue fines to cover losses incurred by the client, but this
payments seldom cover the losses generated by the outage
other utility service can can affect organizational well. among these are
telephone,cable television .the loss of these service can impair the ability
of an organization to function
2.6power irregularities
2.7espionage or trespass
2.8forces of nature
forces of nature ,force majeure ,or acts of god can present some of the
most dangerous threats ,because they usually occur with very little
warning and are beyond the control of the people. this threats ,which
include events such as fires ,floods ,earthquakes ,and lighting as well as
volcanic eruptions and insect infestations, can disrupt not only the lives
of individuals but also the storage ,transmission ,and use of information.
some of the more common threats in this group are listed here
2.12theft