Four Primary Threats to Security in Computing

Posted on Posted in Information Security

These are the four primary threats to security in computing:

Interception – Unauthorized party (person, program, or computing system) gains access to an asset – E.g. illicit copying of program or data files, wiretapping to obtain data in a network
Interruption – Asset becomes lost, unavailable, or unusable- E.g. malicious destruction of h/w device, erasure of data file
Modification – Unauthorized party tampers with an asset – E.g. changing values in a db, modifying data being transmitted by email
Fabrication – Unauthorized party fabricates counterfeit objects – E.g. add records to an existing db, insert transaction to a network communications system

Leave a Reply

Your email address will not be published. Required fields are marked *