1)Data missing Causes the selective information missing the reason to include: designed Action - Intentional deletion of a deposit or program. Unintentional Action - Accidental deletion of a accuse or program, Misplacement of CDs, Administration errors, Inability to read confidential shoot format. Failure clay failures resulting in corrupt illegible files. Disaster - Natural disaster, earthquake, flood, tornado, fire, etc. 2)Network attack For system vulnerabilities and softwargon top side attacks carried out mainly distri exclusivelyed denial of service attacks, using buffer zone overflow attacks. 3)Virus or trojan A info central processing unit virus is a computing machine program that basis copy itself and vitiate a computing machine. The term virus is excessively commonly but erroneously used to refer to other types of malw ar, adware, and spyware programs that do not have the reproductive ability. A true up virus ca n only spread from one ready reckoner to another (in few form of executable code) when its host is interpreted to the tar shorten computer; for instance because a user sent it over a network or the Internet, or carried it on a CD, DVD, or USB.
Viruses can increase their chances of paste to other computers by infecting files on a network file system or a file system that is regained by another computer. Trojan horses are designed to allow a hacker remote door to a target computer system. Once a Trojan horse has been instal top on a target computer system, it is thinkable for a hacker to access it remotely a nd perform conglomerate trading operations! . The operations that a hacker can perform are expressage by user privileges on the target computer system and the design of the Trojan horse. Password theft thieving passwords to access computer entropy. Human factors Interpersonal deception, or information data manager or owner inadvertently led to data security threats and the most vulnerable situation.If you want to get a full essay, order it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment