Please enable JavaScript.
Coggle requires JavaScript to display documents.
COMPUTER SECURITY - Coggle Diagram
COMPUTER SECURITY
ATTACKS
-
-
another system, as when one
•system sends an overwhelming set of messages to another,
-
-
CONTROL
The control is an action, device, procedure or technique
-
-
-
-
-
VULNERABILITY
-
•Weaknesses can appear in any element of a computer,
both in the hardware, operating system, and the
-
HARDWARE VULNERABILITY
Computers have been drenched with water, burned, frozen,
gassed, and electrocuted with power surge
SO VULNERABILITIES
the attacks are obvious, as when the software
-
-
THREATS
-
-
• There are many threats to a computer system, including
-
-
-
interception, interruption, modification, and fabrication.