Question

What are the two types of threats to information security? What are examples of each type...

What are the two types of threats to information security? What are examples of each type of threat? (Minimum 350 words and no plagiarism please.)

0 0
Add a comment Improve this question Transcribed image text
Answer #1


The two types of threats to information security are as mentioned under:-

1.   PHISHING and 2. RANSOMWARE

The threat to information security is to steal the confidential details by do not let the user or owner known about the act. The attackers basically target the system by spreading harmful viruses so that the system starts to malfunction and important data can be cracked down from the source.


1.   PHISHING: It is basically the social engineering attacking process by sending emails, text messages, and instant messages to the user. The above context holds some malicious codes that can easily make the attacker steal user data if they download such things from those specific areas.
2. RANSOMWARE: With malicious software, the attackers take full control of the computer and until the user of that computer does not fulfill the ransom demanded by attackers it cannot be released under any condition. In case, if the user tries to break the system by any means all information may be crashed.


Examples of each type of threat:

1.   PHISHING:

It is a matter of leading Software Company who was flourishing at a top-notch level in the industry. Suddenly, the company has witnessed that there were major issues in the server and all information related to clients has lost. Not only this, all sorts of current work processes have been manipulated so that customer delivery should not occur. Later, an inspection has been made in the company and it has been obtained that the manager has downloaded a video from the email that was containing some potential coding to easily crack any system within a minute. Thus, it has resulted in stealing valuable information related to the company.   


2. RANSOMWARE:

It has happened with the electric power supply company where the attackers have stop access to the main computer on which the server is connected. The attackers have demanded a high amount to release the block of the system. In this way, by planting a type of malicious software the attacker has denied the access of the computer system and demanded a ransom has to be paid for getting the system fully accessible.

Add a comment
Know the answer?
Add Answer to:
What are the two types of threats to information security? What are examples of each type...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT