Threats

Description

Threats impacts and trends
anitha.bachina
Mind Map by anitha.bachina, updated more than 1 year ago
anitha.bachina
Created by anitha.bachina over 8 years ago
4
0

Resource summary

Threats
      1. Damage/Loss(IT assests)
          1. Nefarioushactivity)Abuse
              1. Eavesdropping)Interception)Hijacking
                  1. Outages
                      1. I. Malicious Code: Worms/Trojans
                        1. Annotations:

                          • Trends:Ø It will attack by being bundled with free software files. Ø It will occur as attached macros to the files. Ø Use of Custom encryption to communicate with C&C servers. Ø condition of multi-platform capabilities Ø use of obscurity network Ø Lack-of multi layered security system
                          1. Failures)Malfunctions
                              1. Legal
                                      Show full summary Hide full summary

                                      Similar

                                      LS100 Chapter 15 Quiz
                                      cnolan9172
                                      Unit 5.3 Sound Energy
                                      Zubayr C-137 Rashid
                                      Business Studies - Globalization
                                      Rawan Jurdi
                                      Apologia Physical Science Module #15
                                      Emily Baffa
                                      Starting University
                                      caroline.sindall
                                      Types of Attacks
                                      River L.
                                      Systems software L1 Network threats Quiz
                                      Sam Houghton
                                      Information Security: Chapter 2
                                      marcb176
                                      Las Economías Fiscales
                                      Matias Sagaón
                                      Gestión del cambio
                                      lilia aire de la cruz muñoz
                                      Threats
                                      kvromant