The document discusses threats to computer security from both internal and external sources. It defines physical threats as events that damage equipment and data threats as events that remove, corrupt, or steal information. Internal threats can be malicious, involving intentional damage, or accidental from unintentional user errors. External threats are either unstructured attacks using available resources to access systems or structured attacks using code to access operating systems. Physical damage to equipment and data loss can be costly to an organization's business and reputation.
The document discusses threats to computer security from both internal and external sources. It defines physical threats as events that damage equipment and data threats as events that remove, corrupt, or steal information. Internal threats can be malicious, involving intentional damage, or accidental from unintentional user errors. External threats are either unstructured attacks using available resources to access systems or structured attacks using code to access operating systems. Physical damage to equipment and data loss can be costly to an organization's business and reputation.
The document discusses threats to computer security from both internal and external sources. It defines physical threats as events that damage equipment and data threats as events that remove, corrupt, or steal information. Internal threats can be malicious, involving intentional damage, or accidental from unintentional user errors. External threats are either unstructured attacks using available resources to access systems or structured attacks using code to access operating systems. Physical damage to equipment and data loss can be costly to an organization's business and reputation.
Attacks To successfully protect computer and the network , a technician must understand both of the following types of threats to computer security.
• Physical: Event or attacks that remove that
steal, damage, or destroy such equipment as servers, switches, and wiring. • Data: Events or attacks that remove, corrupt, deny access to , allow access to, or steel information. Threats to security can come from inside or outside an organization, and the level of potential damage can vary gently. Potential threats include the following: • Internal: Employees who have access to data, equipment, and the network. Internal attacks can be characterized as follows: * Malicious threats are when an employee intends to cause damage damages. * Accidental threats are when the user damages data or equipment unintentionally • External: Users outside an organization who do not have access to the network or resources. External attacks can be characterized as follows:
* Unstructured attacks, which use available
resources, such as passwords or scripts, to gain access and to run programs designed to vandalize * Structured attacks, which use code to access operating systems and software. Physical loss or damage to equipment can be expensive, and data loss can be detrimental to your business and reputation. Threats against data are constantly changing as attackers find new ways to gain entry and commit their crimes. Quiz 1.Employees who have access to data, equipment, and the network. 2. Users outside an organization who do not have access to the network or resources. 3.User damages data or equipment unintentionally. 4. Events or attacks that remove, corrupt, deny access to , allow access to, or steel information. 5. Event or attacks that remove that steal, damage, or destroy such equipment as servers, switches, and wiring. Answers: 1. Internal 2. External 3. Malicious threats 4. Data 5. Physical