CIS 333 Identifying Risk and Responses
Identifying Potential Risk, Response, and Recovery
Assignment 2: Identifying Potential Risk, Response, and Recovery
Tebonye Crawford
November 30, 2013
Dr. Robert Whale
CIS 333
Identifying Potential Risk, Response, and Recovery
Many potential threats and vulnerabilities leave a system open to malicious attacks. Anytime you have a computer network that connects to the internet there is a potential for malicious attack, so it is important that you know the vulnerabilities of a system to protect it from potential threats and malicious attacks.
"A ...
Want to read the rest of this paper? Join Essayworld today to view this entire essay and over 50,000 other term papers
|
the Workstation Domain, there exists unauthorized user access, weakness in installed software. In addition, there are malicious software introduced vulnerabilities, unauthorized network access, transmitting private data unencrypted, and spreading malicious software. Other examples of vulnerabilities are exposure and unauthorized access of internal resources to the public, introduction of malicious software, loss of productivity due to internet access. Denial of service attacks, brute-force attacks on access and private data are all examples of vulnerabilities within the seven domains of IT infrastructure.
Threats can cause great harm or damage to computer systems through their vulnerabilities, there are many types of threats, which can be human, natural, or environmental. Natural threats are floods, earthquakes, tornadoes, hurricanes, and landslides. Human threats could be accidental or intentional deletion of data, malicious software upload, and unauthorized access. ...
Get instant access to over 50,000 essays. Write better papers. Get better grades.
Already a member? Login
|
CITE THIS PAGE:
CIS 333 Identifying Risk and Responses. (2014, January 17). Retrieved November 28, 2024, from http://www.essayworld.com/essays/CIS-333-Identifying-Risk-and-Responses/103568
"CIS 333 Identifying Risk and Responses." Essayworld.com. Essayworld.com, 17 Jan. 2014. Web. 28 Nov. 2024. <http://www.essayworld.com/essays/CIS-333-Identifying-Risk-and-Responses/103568>
"CIS 333 Identifying Risk and Responses." Essayworld.com. January 17, 2014. Accessed November 28, 2024. http://www.essayworld.com/essays/CIS-333-Identifying-Risk-and-Responses/103568.
"CIS 333 Identifying Risk and Responses." Essayworld.com. January 17, 2014. Accessed November 28, 2024. http://www.essayworld.com/essays/CIS-333-Identifying-Risk-and-Responses/103568.
|