Photobucket
Choose Background Colour

Get this Widget from here!!!

Threats to the system

| |

The forms of threats to the system
If you are professional or aspiring as a competent administrator, you certainly need to know the forms of any threats that might occur on a computer system that you handle. Basically a form of threats to computer systems can be grouped into four categories, namely:

1. InterruptionInterruption is a form of threat terhapap availability, in which a vandalized so that data can not be used again. Act of vandalism committed to the destruction of physical and non physical. Physical destruction is generally in the form of destruction of hard drives and other storage media and network cable cut .. while the destruction of non-physical form of the elimination of certain files from a computer system.


2. InterceptionInterception is a form of threat against the secrecy, where the party is not entitled to succeed to get the permissions to read the data / information from a computer system. The action is usually done by tapping the data is usually transmitted via the public / public. Such measures commonly known as the wiretapping in the wired networking (network that use cable as a medium for data transmission).


3. ModificationModification is a form of threat to the integrity, in which unauthorized parties managed to get access rights to change any data / information from a computer system. Normally the data / information that changed the records from a table in the database file.


4. FabricationFabrication is also a form of threat to integrity. The usual action is to replicate and insert an object into the computer system. The object that is inserted can be a file or a record is inserted in an application program.


ConclusionNow that we know some basic form of threats to computer systems, our discourse is expected to become more open and more serious in dealing with various forms of threats to computer systems that we handle. As a good administrator, we should not be too quick to feel satisfied with the security system we design / build and concluded that the network that we handle is secure, because every action penyerakan against a computer system has a different way even though its basic form is always the same . So always beware and do not be careless.

Readmore..
 

Flag Counter

free counters

Cluster Maps

MyBlogLog

Like Button

© Copyright 2010. joedithia99.blogspot.com . All rights reserved | joedithia99.blogspot.com is proudly powered by Blogger.com | Template by o-om.com - zoomtemplate.com
Photobucket