Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 1 (SOURCE OF THREATS (Internal Threat ., Mobile and remote users,…
CHAPTER 1
-
SECURITY METHOD
- Lagon : using strong password (encrypted log in) .
- File System : install security patches regularly (install firewall)
- Data communication : restricted connection (do not open the network to the public without any monitoring)
SECURITY THREATS
INSECURE ARCHITECTURES : A misconfigured network is a primary entry point for unauthorized users.
BROADCAST NETWORK : Using hardware without implement protection to save the data that has been there.
CENTRALIZED SERVERS : Central server can allow access to the entire network.
CATEGORIES
- Data disclosure ( the internal data are exposed to outside user)
- Data modification ( data are being alter from its original form )
- Data availability ( data easily gathered by hackers )
-
-
-
SECURITY POLICIES
- Authenticate all network protocols
- Do not allow external traffic into secure network areas
INTERNET SERVICES
- Email and news : Attaching and sending document via email .
- File transfer : peer to peer or client server .
- Remote access to host : Remote administration to server .
- Real time conferencing services : Teleconferencing - Skype
THREATS TERMINOLOGY
- Information Theft : Get the private information ( ID number,passwrd) without any permissions.
- Unauthorized Disclosure : An involving the exposure of information to entities not authorized access to the information.
- Information Warfare : May involve collection of tactical information to demoralize the enemy and the public .
- Accidental Data Loss : Delete file unfortunately