Network Based Threat Research

Submitted by: Submitted by

Views: 10

Words: 620

Pages: 3

Category: Science and Technology

Date Submitted: 09/25/2015 05:35 AM

Report This Essay

Network Based Threat Research

Marnell Thomas

NTC 324

August 24, 2015

Levi Royster

Network Based Threat Research

What Is a Network Based Threat?

Network based threats are probable risk that can be exploited to expose security vulnerability and thus cause possible harm. These can either be intended, unintentional and even circumstantial. These threats can be categorized according to their type and source, such as: physical, natural, essential service issues, compromised information and non-malicious employees. The source or origin of the threat also plays a major part in how it is classified. A threat can be deliberate, accidental, environmental and also due to negligence.

Physical and environmental threats usually consist of threats that can range from natural disasters like hurricanes and tornados, to man-made threats like vandalism. These threats are dangerous because they can leave the network completely destroyed. Essential service issues, such as power issues, electricity outages or plumbing problems can also be a major threat to network operations due to downtime until services return and recovery cost. Compromised information due to user negligence as well as attacks such as APTs (Advanced Persistent Threats) is one of the biggest threats to network infrastructure. Another good example of compromised information is when poor security measures allow anonymous access to delicate information. Also, according to "Security Threats" (2015), “the primary threat to data integrity comes from authorized users who are not aware of the actions they are performing” (Non-Malicious Employees) are significant network based threats. They are also known as the “unintentional insider threat” (UIT).

How to Counter These Threats

To counter these attacks there are several things that need to be done. When dealing with Mother Nature there aren’t many options available to safeguard your network. According to "Security Threats" (2015), “the best course of action is...