Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Security Goals
It is also usually believed that its competitor actually planted spies within the
organization in order to target and steal new product plan.
Remotely disabling target using software (e.g.; television and radio disinformation)
Caused by a careless employee or an untrained employee who did not know better
SECURITY THREATS
Categories::
Data disclosure:
Exposure of data to third parties. Key point to consider is whether the disclosure is
relevant and necessary.
Data modification:
A modification attack is an attempt to modify information that an attacker is not
authorized to modify.
Data availability:
Describe products and services that that continues to be available at a required level
of performance in situations ranging from normal through "disastrous."
SECURITY THREATS
Activities::
Hacking:
Activities to breaks into someone else's computer system to accomplish the hackers goal.
Cracking:
Bypasses passwords or licenses in computer programs.
SECURITY THREATS
Spoofing:
A method of attacking a computer program, in which the program is modified so as
to appear to be working normally when in reality it has been modified with the
purpose to circumvent security mechanisms.
Sniffing:
A method that a network device uses to identify available wireless networks in the
area.
REFLECTION
TEST YOUR UNDERSTANDING
1- When Maybank2u.com website encounter system down, which network security
goals it violates?
2- User access is difficult and cumbersome. Which security models suits this
statement?