Académique Documents
Professionnel Documents
Culture Documents
For this there are a number of: standards, protocols, methods, rules, tools and
laws designed to minimize potential risks to infrastructure or information.
Establish estndars to
minimized risks
The Users Hours of operation,
restrictions, denials, etc
Users Malware An intruder Internal
Software Cracker Staffs
designed to Defacer
Cause the harm or make Systems
greatest illicit use of
Script kiddies A loss
problem of a Script boy
system
safety security resources -The bids of
system -A malicious power that
manipulation lead to
didissociation
Internal Threats
Users know the This situations is present because:
network and how it
works. - The inefficient of the safety
schemes which have the
majority of companies worldwide.
- The violation of the systems.
The IPS and firewalls
are not effective - - The IPS and firewalls are not effective
mechanisms internal - mechanisms internal threats.
threats.
External Threats
These are threats that originate from outside the network.
RECOMENDATIONS
Keep active and current solutions.
Do not conduct business in public computers.
Check suspicious email attachments