Please enable JavaScript.
Coggle requires JavaScript to display documents.
Assuring Reliable and Secure IT services (Downtime (Availability Math…
Assuring Reliable and Secure IT services
Downtime
Acceptance rate
Examples
Cost
Availability Math
Components in Series
Component in Parallel
redundancy
IT Security
Financial Impact
Classification of Threats
Intrusions
Social Engineering
No tech to prevent
Ex: Phishing
Solutions: VPN, train users
External Threats
Sniffer programs
How: eaversdrop
Consequences
Securing Wireless points
Not broadcast SSID
Encrypt communications (WEP, WPA)
MAC (address of each device in network) filtering