Home » Downloads » be proesstional- class security

be proesstional- class security

be proesstional- class security

You identified a number of threats to your organization.  How would these threats actually attack your organization?

Describe five (5) items using the following parameters–

Vulnerability —-Threat Source/Actor —- Threat Action

the organization in the attachment

 

 

 

 

…………Answer Preview…………….

VULNERABILITY/THREAT THREAT SOURCE THREAT ACTION
HACKER A hacker is someone who exploits weaknesses in a computer system. Most hackers do it via an organization’s network resources. For instance, they infiltrate the organization’s internet connection and access the LAN. From here, they can carry out their malicious tasks. Firewalls should be installed in organization networks before they are allowed to access internet connections. These firewalls block any authorized attacks to the network resources.
× Lets chat on whatsapp?