2004 Chapter Chapter 1 and Chapter 2: CYBERSECURITY CHAPTER 1 (Part 3 ) TO CHAPTER 2 (PART 1)

14 views2 pages
26 Nov 2021
Department
Course
Professor

Document Summary

Threats that originate within an organization or from outside of an organization. This could be because an internal user such as an employee, an internal user or a contract partner. Have greater potential of causing greater damage than external threats due to the threats gaining direct access to the building and it"s infrastructure. Employees also have knowledge of corporate networks, resources and confidential information and data. As well as having access of user or administrative privileges. Exploit vulnerabilities in network or computing devices. May also use social engineering as a a way to gain access. Cyber space has become another place where warfare takes place. Nations can carry out conflicts without the clashes of traditional troops and machines. Allows countries with minimal military presence to be as strong as other nations in cyberspace. Internet-based conflict that involves the penetration of computer systems and networks of other nations.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions