|
|
|
|
|
|
|
|
|
|
|
|
Sources of Threats |
||||||||
| A person, a group of people, or even some phenomena unrelated to human activity | ||||||||||
| can serve as an information security threat. Following from this, all threat sources | ||||||||||
| break down into three groups: | ||||||||||
| The human factor. This group of threats concerns the actions of people with | ||||||||||
| authorized or unauthorized access to information. Threats in this group can be | ||||||||||
| divided into: | ||||||||||
|
||||||||||
|
||||||||||
| The technological factor. This threat group is connected with technical problems - | ||||||||||
| equipment used becoming obsolete and poor-quality software and hardware for | ||||||||||
| processing information. This all leads to equipment failure and often to data loss. | ||||||||||
| The natural-disaster factor. This threat group includes any number of events | ||||||||||
| brought on by nature and other events independent of human activity. | ||||||||||
|
|
|
|
Link to us | Contact us | Site map | Privacy |
|
© Copyright 2008 USB AntiVirus International Inc. All Rights Reserved |