|
|
|
Sources of Threats |
|||||||||||||
A person, a group of people, or even some phenomena unrelated to human activity | ||||||||||||||
can serve as an information security threat. Following from this, all threat sources | ||||||||||||||
break down into three groups: | ||||||||||||||
The human factor. This group of threats concerns the actions of people with | ||||||||||||||
authorized or unauthorized access to information. Threats in this group can be | ||||||||||||||
divided into: | ||||||||||||||
|
||||||||||||||
|
||||||||||||||
The technological factor. This threat group is connected with technical problems - | ||||||||||||||
equipment used becoming obsolete and poor-quality software and hardware for | ||||||||||||||
processing information. This all leads to equipment failure and often to data loss. | ||||||||||||||
The natural-disaster factor. This threat group includes any number of events | ||||||||||||||
brought on by nature and other events independent of human activity. | ||||||||||||||
Link to us | Contact us | Site map | Privacy |
© Copyright 2008 USBVirus International Inc. All Rights Reserved |