You are on page 1of 7

Security

Attacks
To successfully protect computer and the network
, a technician must understand both of the
following types of threats to computer security.

• Physical: Event or attacks that remove that


steal, damage, or destroy such equipment as
servers, switches, and wiring.
• Data: Events or attacks that remove, corrupt,
deny access to , allow access to, or steel
information.
Threats to security can come from inside or
outside an organization, and the level of
potential damage can vary gently.
Potential threats include the following:
• Internal: Employees who have access to
data, equipment, and the network. Internal
attacks can be characterized as
follows:
* Malicious threats are when an employee
intends to cause damage damages.
* Accidental threats are when the user
damages data or equipment unintentionally
• External: Users outside an organization who
do not have access to the network or
resources. External attacks can be
characterized as follows:

* Unstructured attacks, which use available


resources, such as passwords or scripts, to
gain access and to run programs designed to
vandalize
* Structured attacks, which use code to
access operating systems and software.
Physical loss or damage to equipment
can be expensive, and data loss can be
detrimental to your business and
reputation. Threats against data are
constantly changing as attackers find
new ways to gain entry and commit
their crimes.
Quiz
1.Employees who have access to data,
equipment, and the network.
2. Users outside an organization who do not have
access to the network or resources.
3.User damages data or equipment
unintentionally.
4. Events or attacks that remove, corrupt, deny
access to , allow access to, or steel information.
5. Event or attacks that remove that steal,
damage, or destroy such equipment as servers,
switches, and wiring.
Answers:
1. Internal
2. External
3. Malicious threats
4. Data
5. Physical

You might also like