be proesstional- class security
You identified a number of threats to your organization. How would these threats actually attack your organization?
Describe five (5) items using the following parameters–
Vulnerability —-Threat Source/Actor —- Threat Action
the organization in the attachment
…………Answer Preview…………….
VULNERABILITY/THREAT | THREAT SOURCE | THREAT ACTION |
HACKER | A hacker is someone who exploits weaknesses in a computer system. Most hackers do it via an organization’s network resources. For instance, they infiltrate the organization’s internet connection and access the LAN. From here, they can carry out their malicious tasks. | Firewalls should be installed in organization networks before they are allowed to access internet connections. These firewalls block any authorized attacks to the network resources. |