Question #5 - Deliberate attacks (20 marks)
Theresa Trueheart worries about deliberate attacks upon Nod Nocturnal Security
Service, whether from competitors, criminals, or others. Name five types of
deliberate attacks, what they are, who might likely do them, and what the
company could do to manage the risk (4 each, 20 total)
Answer:
Espionage or trespass occurs when an unauthorized individual attempts to gain
illegal access to organizational information. In many cases, espionage is carried
out by employees or former employees of the organization in question. In other
cases, it may be carried out by outsiders who have no connection to the
organization.
Espionage or trespass occurs when an unauthorized individual attempts to gain
illegal access to organizational information.
In the past, this was typically done by breaking into a building and stealing
sensitive documents. Today, it's more likely that someone will try to hack into the
company's servers and steal information electronically.
The best way to protect against this type of threat is by implementing a
comprehensive security strategy that includes:
Content Security Network Security Physical Security Infrastructure Security
Application Security Personnel Security Information Security Business Continuity
Disaster Recovery Risk Management Auditing Compliance Error Handling The
following sections of this document will discuss each of these components in
more detail.
Theresa Trueheart worries about deliberate attacks upon Nod Nocturnal Security
Service, whether from competitors, criminals, or others. Name five types of
deliberate attacks, what they are, who might likely do them, and what the
company could do to manage the risk (4 each, 20 total)
Answer:
Espionage or trespass occurs when an unauthorized individual attempts to gain
illegal access to organizational information. In many cases, espionage is carried
out by employees or former employees of the organization in question. In other
cases, it may be carried out by outsiders who have no connection to the
organization.
Espionage or trespass occurs when an unauthorized individual attempts to gain
illegal access to organizational information.
In the past, this was typically done by breaking into a building and stealing
sensitive documents. Today, it's more likely that someone will try to hack into the
company's servers and steal information electronically.
The best way to protect against this type of threat is by implementing a
comprehensive security strategy that includes:
Content Security Network Security Physical Security Infrastructure Security
Application Security Personnel Security Information Security Business Continuity
Disaster Recovery Risk Management Auditing Compliance Error Handling The
following sections of this document will discuss each of these components in
more detail.