|
Threats to information (computer) security are various actions that can lead to violations of the state of information protection. In other words, these are potentially possible events, processes or impacts that can harm information and computer systems. Information security threats can be divided into two types: natural and artificial. Natural phenomena include natural phenomena that are not dependent on humans, such as hurricanes, floods, fires, etc. artificial threats depend directly on the person and can be intentional and unintentional. Unintentional threats arise due to negligence, inattention and ignorance. An example of such threats can be the installation of applications that are not among the necessary ones for work and further disrupt the system, which leads to the loss of information. Intentional threats, unlike the previous ones, are created on purpose. These include attacks by intruders both from outside and from within the company. The result of the implementation of this type of threat is the loss of funds and intellectual property of the organization.
Unwanted content - malicious code, potentially dangerous programs and spam, that is, what is directly created to destroy or steal information.
Unauthorized access - viewing information by an employee who does not have permission to use it, by exceeding official authority. Unauthorized access leads to information leakage. Depending on what data and where it is stored, sources can be organized in different ways, namely through attacks on sites, hacking programs, intercepting data over the network, using unauthorized programs.
Keywords:virtual server, VPS, VDS, anti-virus protection.
|