0% found this document useful (0 votes)
23 views

Davonte Brown Unit Assignment 1 6-18-2014

The document lists 14 potential information security threats, assigning each a letter code, including violations of security policies by users, malware infections, denial of service attacks, and compromised or lost data. It provides brief identifiers for common issues like disgruntled employees, unauthorized access to networks, and downloading unknown files without proper precautions.

Uploaded by

MahlikBrown
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Davonte Brown Unit Assignment 1 6-18-2014

The document lists 14 potential information security threats, assigning each a letter code, including violations of security policies by users, malware infections, denial of service attacks, and compromised or lost data. It provides brief identifiers for common issues like disgruntled employees, unauthorized access to networks, and downloading unknown files without proper precautions.

Uploaded by

MahlikBrown
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Davonte Brown

Unit assignment 1
6-18-2014
1. Violation of a security policy by a user ___C_____
2. Disgruntled employee sabotage ____I____
3. Download of non-business videos using the
Internet to an employer-owned computer ____A____
4. Malware infection of a users laptop ____L___
5. Unauthorized physical access to the LAN ____N__
6. LAN server operating system vulnerabilities ____F_
7. Download of unknown file types from unknown sources by local users
____B___
8. Errors and weaknesses of network router, firewall, and network
appliance configuration file ____H___
9. WAN eavesdropping ____M___
10. WAN Denial of Service (DoS) or Distributed Denial of
Service (DDoS) attacks ____D___
11. Confidential data compromised remotely ____K____
12. Mobile worker token stolen ____G___
13. Corrupt or lost data ____E___
14. Downtime of customer database ____J__

You might also like