Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Review the threats and corresponding attacks in Table 2-1 in your textbook. How

ID: 3800894 • Letter: R

Question

Review the threats and corresponding attacks in Table 2-1 in your textbook. How would you prioritize these threats and attacks as they relate to the computer network at your home, place of work, and/or a school's computer laboratory? Explain the rationale for how you arrived at your conclusions.

TABLE 2-1: Threats and corresponding attacks Threat Attacks Accidental deletion of user desktop data or files by member of organizatio (accidental user data deletion) Accidental deletion of server data or files by member of organization (accidental server data deletion) Accidental release of critical information by member of organization, including due to social engineering efforts (accidental leak) Act of human error Accidental error or failure to follow procedure in creating software or or failure hardware vulnerabilities Accidental modification or deletion of data due to failure to follow policies or procedures Installation of unauthorized software Improper configuration of software or hardware Unauthorized installation of software in violation of its licensing (piracy) Compromises to Release of organizational information performed outside the bounds of policy, sometimes classified as a "leak" intellectual property Violation of fair use of copyrighted material (plagiarism)

Explanation / Answer

Act of human error or failure is a threat that can happen anywhere like in office, school e.t.c. actually this might happen due to unawareness of usage of desktop or laptop. By not knowing the clear and complete knowledge of operation if any person still uses the desktop which is having important data then it might be a big issue or threat.

Comprises to intellectual property:- This type will mostly happen in home computer or personal computers as the people don't bye the software instead of buying they use pirated software this causes a big threat to the computer in the form of virus or theft of critical data when in online like that. In some small organisation employees may install some unlicensed software to do some personal work in that case it is a big threat to company.

Deliberate acts of trespass it can be seen everywhere like in home computer or in work place computer whenever if you may leave the computer without security i.e. unlocked, unauthorised person's may use the computer to get some important data.

Deliberate acts of information extortion this is the threat caused by some unethical people as they take critical information and do Black mail higher authorities to get their demand success.

Deliberate act of sabotage or call vandalism this ty of threat ca be happen every where if any person doesn't like the company or having any issues with management that person knowingly release some critical information outside.

Deliberate acts of theft some people in the organisation knowingly take organisation data or software or something thr property of organisation can take outside for their personal work.

Deliberate software attack this is the attack happened through internet the hackers will try to access your system by sending malicious things to your desktop and try to delete or change or take the data. If it is personal home computer he may take banking details or password e.t.c like that.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote