ELECTRONIC MAIL AND NEWS
- ways for people exchanging information without requiring immediate n interactive response.
FILE TRANSFER
- exchange files.
REMOTE ACCESS TO HOST
- log on from a distant location
REAL TIME CONFERENCING SERVICES
- Online (video conference)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
ATTACK
1. information theft
:: allow attacker to get data without directly use our computers. ::
how >> - dumpster diving n steal email
used for>> - to access bank account or to make loan
2. unauthorized disclosure
::employees leaking confidential information to attacker or attacker planted spies in order to steal information ::
how>> -planting virus, trojan horse or snooping software
3. information warfare
::remotely disabling target using software , disinformation >> false /inaccurate information that is spread deliberately ::
4. Accidental data loss
::caused by coincidently delete wrong file , usually causing by careless employee or untrained employee::
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
SECURITY THREAT
categories :
- data disclosure - exposure data to third parties. key point to ensure that disclosure are relevant and necessary
- data modification
- data availability
activities :
- hacking - modifying computer hardware n software
- cracking -breaks into someone computers system pr bypass password or licence in computer programs.
No comments:
Post a Comment