Information Security of Threat

Information Security of Threat and a vulnerability are not one and also the same. Security of Threat may be a person or event that has the potential for impacting a valuable resource in a very negative manner. A vulnerability is that quality of a resource or its environment that enables the threat to be complete. AN armed robber is AN example of a threat.

A bank teller is AN example of a valuable resource which will be vulnerable throughout a bank robbery. Bullet-proof glass between the robber and also the teller denies the robber the chance to shoot the teller. The threat remains gift, however one in every of its harmful effects (a gun shot) has been mitigated by a protection mechanism (the glass).

Also Read :  What is Information Security & types of Security policies

In Information Security threats are often many like Software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion.

There are three types of information security threats:

Network Threats:

A network is the collection of computers and other hardware connected by communication channels to share resources and information. As the information travels from one system to the other through the communication channel, a malicious person might break into the communication channel and steal the information traveling over the network. A Threat are often defined as something that is danger to associate degree organization’s quality.

Threats are often physical threat of network primarily based threats. associate degree assaulter might exploit poorly organized network infrastructure devices sort of a firewall, router network servers or switches. Default settings network infrastructure devices, loose access controls, applications and software package while not correct updates etc. are vulnerabilities and may be exploited by associate degree assaulter.

Listed below are some of the network threats:

Information gathering Sniffing and eavesdropping Spoofing
Session hijacking
Man-in-the-Middle attack
DNS and ARP poisoning
Password-based attacks
Denial-of-Service attack
Compromised-key attack
firewall and IDS attack

Host Threats

Host threats target a particular system on which valuable information resides. Attackers try to breach the security of the information system resource. Choosing a dedicated host server instead of shared hosting set up features at on of perks. you’ve got complete management on the server and can have free reign to customize everything to suit your business or ideas.

With of these management at your fingertips, a frenzied server hosting set up-can shoulder you with loads additional responsibility than its counterpart. For one, if you’ve got quite one account registered then it’s up to you to update and maintain all the securities necessary just in case of an epidemic attack and such. It all comes right down to you once it involves protective your server.

Listed below are some of the host threats:

Malware attacks
Foot printing
Password attacks
Denial-of-Service attacks
Privilege escalation
Arbitrary code execution
Backdoor attacks
Unauthorized access
Physical security threats

Related Product : Certified Ethical Hacker | CEH Certification

Application Threats

Applications can be vulnerable if proper security measures are not taken while developing, deploying, and maintaining them. Attackers exploit the vulnerabilities present in an application to steal or destroy data. Malicious users can attempt to access your internet application while not your consent. Therefore, you ought to implement the mandatory security measures to guard yourself from new internet application threats: Spoofing, info revelation and information change of state. Let’s see however are able to mitigate threats mistreatment Plesk security tools.

Listed below are some of the application threats:

Improper data/input validation
Authentication and authorization attacks
Security misconfiguration
Improper error handling and exception management
Information disclosure
Hidden field manipulation
Broken session management
Buffer overflow issues
Cryptography attacks
SQL injection

Questions related to this topic

  1. What are the threats of network security?
  2. What are some common network security vulnerabilities and threats?
  3. What are the threats of vulnerability?
  4. What are attacks and threats?

Learn CEH & Think like hacker

This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092
Contact us
 – www.info-savvy.com

Leave a Comment