Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
CIS 333 Identifying Risk and Responses - School Essays

CIS 333 Identifying Risk and Responses

Identifying Potential Risk, Response, and Recovery
Assignment 2: Identifying Potential Risk, Response, and Recovery
Tebonye Crawford
November 30, 2013
Dr. Robert Whale
CIS 333



Identifying Potential Risk, Response, and Recovery

Many potential threats and vulnerabilities leave a system open to malicious attacks. Anytime you have a computer network that connects to the internet there is a potential for malicious attack, so it is important that you know the vulnerabilities of a system to protect it from potential threats and malicious attacks.

"A ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

the Workstation Domain, there exists unauthorized user access, weakness in installed software. In addition, there are malicious software introduced vulnerabilities, unauthorized network access, transmitting private data unencrypted, and spreading malicious software. Other examples of vulnerabilities are exposure and unauthorized access of internal resources to the public, introduction of malicious software, loss of productivity due to internet access. Denial of service attacks, brute-force attacks on access and private data are all examples of vulnerabilities within the seven domains of IT infrastructure.

Threats can cause great harm or damage to computer systems through their vulnerabilities, there are many types of threats, which can be human, natural, or environmental. Natural threats are floods, earthquakes, tornadoes, hurricanes, and landslides. Human threats could be accidental or intentional deletion of data, malicious software upload, and unauthorized access. ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

CIS 333 Identifying Risk and Responses. (2014, January 17). Retrieved November 23, 2024, from http://www.essayworld.com/essays/CIS-333-Identifying-Risk-and-Responses/103568
"CIS 333 Identifying Risk and Responses." Essayworld.com. Essayworld.com, 17 Jan. 2014. Web. 23 Nov. 2024. <http://www.essayworld.com/essays/CIS-333-Identifying-Risk-and-Responses/103568>
"CIS 333 Identifying Risk and Responses." Essayworld.com. January 17, 2014. Accessed November 23, 2024. http://www.essayworld.com/essays/CIS-333-Identifying-Risk-and-Responses/103568.
"CIS 333 Identifying Risk and Responses." Essayworld.com. January 17, 2014. Accessed November 23, 2024. http://www.essayworld.com/essays/CIS-333-Identifying-Risk-and-Responses/103568.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 1/17/2014 04:57:08 PM
Submitted By: adcrawf
Category: Technology
Type: Premium Paper
Words: 757
Pages: 3

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Just A Pot Of Basil
» The United States Steel Indust
» Robinson Crusoe
» Drug Abuse: People Abused Vs. D...
» The Need For Horror And Thrill ...
» Cloud Computing And It's Effect...
» Macbeth 5
» Beloved 2
» Smoking
» Amd Vs. Intel
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved