Felix Mohan, CEO - SecureSynergy | ||||||||||||||||||||||
Enterprise Information Infrastructures have become critical 'centres of gravity'. A collapse of the information infrastructure can lead to collapse of the enterprise. This makes them attractive targets for potential adversaries. | ||||||||||||||||||||||
Active attacks include attempts to: | ||||||||||||||||||||||
| ||||||||||||||||||||||
Typical countermeasures include: | ||||||||||||||||||||||
| ||||||||||||||||||||||
In close-in attacks an unauthorized individual gains close physical proximity to networks, systems, or facilities for the purpose of modifying, gathering, or denying access to, information. Gaining such proximity is accomplished through surreptitious entry, open access, or both. Close-in attacks include modification of data, information gathering, system tampering, and physical destruction of the local system. |
Saturday, August 4, 2007
Defining Information Threats
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment