|
|
|
Sources of Threats |
|||||||||
A person, a group of people, or even some phenomena unrelated to human activity | ||||||||||
can serve as an information security threat. Following from this, all threat sources | ||||||||||
break down into three groups: | ||||||||||
The human factor. This group of threats concerns the actions of people with | ||||||||||
authorized or unauthorized access to information. Threats in this group can be | ||||||||||
divided into: | ||||||||||
|
||||||||||
|
||||||||||
The technological factor. This threat group is connected with technical problems - | ||||||||||
equipment used becoming obsolete and poor-quality software and hardware for | ||||||||||
processing information. This all leads to equipment failure and often to data loss. | ||||||||||
The natural-disaster factor. This threat group includes any number of events | ||||||||||
brought on by nature and other events independent of human activity. | ||||||||||
Link to us | Contact us | Site map | Privacy |
© Copyright 2011 Autorun Remover International Inc. All Rights Reserved |