threat vs attack memo

threat vs attack memo - Memorandum To: Dr Fundaburk CC:...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Memorandum To: Dr Fundaburk CC: Threats of Information Management From: Jesse Fornataro Date: 07:15:49 Re: Assignment 1Chp 2 The Purpose of this memorandum is to heighten the awareness of threats to information systems and to differentiate a threat from an attack. The information security department will handle all the identifying, assessing, and properly managing the risks of a company’s information. A threat is a category of objects, persons, or any other entity that represents a relentless danger to an asset. These threats may vary from one organization to another, but can be distinguished adequately for the most part. Common categories of threats include: Acts of human error or Failure (ex: Accidents, employee mistakes) Compromises to intellectual property (ex: Piracy, copyright infringement) Deliberate acts of espionage or trespass (ex: Unauthorized access and or data collection) Deliberate acts of information extortion (ex: Blackmail of information disclosure) Deliberate acts of sabotage or vandalism (ex: Destruction of systems or
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/04/2011 for the course INFORMATIO 408 taught by Professor Smith during the Spring '11 term at Temple.

Page1 / 2

threat vs attack memo - Memorandum To: Dr Fundaburk CC:...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online