Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

An intruder attack can be labeled mild or serious. An intruder attack is labeled serious when an individual accesses confidential data, performs unauthorized modifications to

An intruder attack can be labeled mild or serious. An intruder attack is labeled serious when an individual accesses confidential data, performs unauthorized modifications to data, or disrupts the system.

Confidentiality, integrity, and availability are three basic targets for network security. Confidentiality ensures that private information is not made available to unauthorized individuals. Data integrity ensures that modifications to data are only done in an authorized manner by authorized personnel. System integrity ensures that a system performs its intended function without disruption or manipulation. Availability assures that systems function properly and that authorized users are not denied access.

Activities for a network risk assessment include but are not limited to the following: Using the peer to peer network

  • Identification and analysis of assets and processes related to the system
  • Identification and analysis of threats that could affect the confidentiality, integrity, or availability of the system
  • Identification and analysis of system vulnerabilities
  • Identification and analysis of protection requirements to mitigate the risks

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Information Technology Project Management

Authors: Kathy Schwalbe

6th Edition

978-111122175, 1133172393, 9780324786927, 1111221758, 9781133172390, 324786921, 978-1133153726

More Books

Students also viewed these General Management questions