Автор:
Оценка:
Опубликованно: 06.08.2025.
Язык: Английский
Уровень: Университет
Литературный список: 18 единиц
Ссылки: Не использованы
  • Конспект 'Computer security threats', 1.
  • Конспект 'Computer security threats', 2.
  • Конспект 'Computer security threats', 3.
Фрагмент работы

Type of threat Causes Solutions
Data exfiltration Outside attackers, careless inside threats Blocking unauthorized communication channels, credential theft and phishing prevention, maintaining user experience, user education
Data breach Weak and stolen credentials (passwords), back doors, application vulnerabilities, malware, social engineering, too many permissions, insider threats, physical attacks, improper configuration, user error Using complex passwords; keeping all software and hardware solutions fully patched and up to date, being wary of accessing web sites which are not what they seem or opening emails where you are suspicious of their origin, rejecting suspicious email offers, putting less permissions, reporting, keeping mistakes and errors to a minimum with professionals
Data loss Human errors, thefts, software corruption, computer viruses, hardware impairment, natural disasters, power failure Backup, firewalls and antivirus, UPS for power failure prevention, DLP strategy, DRP, keeping laptops and other data devices in a dry and dust-free environment, defining access levels to different types of data for different employees, use of RAID storage and journaling file system

Atlants