Please enable JavaScript.
Coggle requires JavaScript to display documents.
Four primary classes of threats (UNSTRUCTURED THREATS (Unstructured…
Four primary classes of threats
UNSTRUCTURED THREATS
Unstructured threats consist of mostly inexperienced individuals using easily available hacking tools such as shell scripts and password crackers.
Even unstructured threats that are only executed with the intent of testing and challenging a hacker’s skills can still do serious damage to a company.
For example, if an external company website is hacked, the integrity of the company is damaged.
Even if the external website is separate from the internal information that sits behind a protective firewall, the public does not know that.
All the public knows is that the site is not a safe environment to conduct business.
STRUCTURED THREATS
Structured threats come from hackers who are more highly motivated and technically competent.
These people know system vulnerabilities and can understand and develop exploit code and scripts.
They understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses.
These groups are often involved with the major fraud and theft cases reported to law enforcement agencies.
EXTERNAL & INTERNAL THREATS
External threats
can arise from individuals or organizations working outside of a company.
They do not have authorized access to the computer systems or network.
They work their way into a network mainly from the Internet or dialup access servers.
Internal threats
occur when someone has authorized access to the network with either an account on a server or physical access to the network.
According to the FBI, internal access and misuse account for 60 percent to 80 percent of reported incidents.