The forms of threats to the system
If  you  are professional or aspiring as a competent administrator, you   certainly need to know the forms of any threats that might occur on a   computer system that you handle. Basically a form of threats to computer systems can be grouped into four categories, namely:
1. InterruptionInterruption is a form of threat terhapap availability, in which a vandalized so that data can not be used again. Act of vandalism committed to the destruction of physical and non physical. Physical destruction is generally in the form of destruction of hard drives and other storage media and network cable cut .. while the destruction of non-physical form of the elimination of certain files from a computer system.
2. InterceptionInterception   is a form of threat against the secrecy, where the party is not   entitled to succeed to get the permissions to read the data /   information from a computer system. The action is usually done by tapping the data is usually transmitted via the public / public. Such   measures commonly known as the wiretapping in the wired networking   (network that use cable as a medium for data transmission).
3. ModificationModification   is a form of threat to the integrity, in which unauthorized parties   managed to get access rights to change any data / information from a   computer system. Normally the data / information that changed the records from a table in the database file.
4. FabricationFabrication is also a form of threat to integrity. The usual action is to replicate and insert an object into the computer system. The object that is inserted can be a file or a record is inserted in an application program.
ConclusionNow  that we know  some basic form of threats to computer systems, our  discourse is  expected to become more open and more serious in dealing  with various  forms of threats to computer systems that we handle. As   a good administrator, we should not be too quick to feel satisfied  with  the security system we design / build and concluded that the  network  that we handle is secure, because every action penyerakan  against a  computer system has a different way even though its basic  form is always  the same . So always beware and do not be careless.
Threats to the system
 |
       | 
	  
Subscribe to:
Comments (Atom)
 


 




