Table 6-3 Threats to InfoSec Threat Compromises to intellectual property Deviations in quality of service from service providers Espionage or trespass Forces of nature Human error or failure Information extortion Sabotage or vandalism Software attacks Technical hardware failures or errors Technical software failures or errors Technological obsolescence Theft Examples Software piracy or other copyright infringement Fluctuations in power, data, and other services Unauthorized access and/or data collection Fire, flood, earthquake, lightning, etc. Accidents, employee mistakes, failure to follow policy Blackmail threat of information disclosure Damage to or destruction of systems or information Malware: viruses, worms, macros, denial-of-services, or script injections Hardware equipment failure Bugs, code problems, loopholes, back doors Antiquated or outdated technologies Illegal confiscation of equipment or information

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Using the list of threats to InfoSec presented in image identify and describe three instances of each that were not mentioned in the image.

Table 6-3 Threats to InfoSec
Threat
Compromises to intellectual property
Deviations in quality of service from
service providers
Espionage or trespass
Forces of nature
Human error or failure
Information extortion
Sabotage or vandalism
Software attacks
Technical hardware failures or errors
Technical software failures or errors
Technological obsolescence
Theft
Source: CACM.
Examples
Software piracy or other copyright infringement
Fluctuations in power, data, and other services
Unauthorized access and/or data collection
Fire, flood, earthquake, lightning, etc.
Accidents, employee mistakes, failure to follow policy
Blackmail threat of information disclosure
Damage to or destruction of systems or information
Malware: viruses, worms, macros, denial-of-services,
or script injections
Hardware equipment failure
Bugs, code problems, loopholes, back doors
Antiquated or outdated technologies
Illegal confiscation of equipment or information
Transcribed Image Text:Table 6-3 Threats to InfoSec Threat Compromises to intellectual property Deviations in quality of service from service providers Espionage or trespass Forces of nature Human error or failure Information extortion Sabotage or vandalism Software attacks Technical hardware failures or errors Technical software failures or errors Technological obsolescence Theft Source: CACM. Examples Software piracy or other copyright infringement Fluctuations in power, data, and other services Unauthorized access and/or data collection Fire, flood, earthquake, lightning, etc. Accidents, employee mistakes, failure to follow policy Blackmail threat of information disclosure Damage to or destruction of systems or information Malware: viruses, worms, macros, denial-of-services, or script injections Hardware equipment failure Bugs, code problems, loopholes, back doors Antiquated or outdated technologies Illegal confiscation of equipment or information
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY