Submitted by: Submitted by marnell12
Views: 10
Words: 620
Pages: 3
Category: Science and Technology
Date Submitted: 09/25/2015 05:35 AM
Network Based Threat Research
Marnell Thomas
NTC 324
August 24, 2015
Levi Royster
Network Based Threat Research
What Is a Network Based Threat?
Network based threats are probable risk that can be exploited to expose security vulnerability and thus cause possible harm. These can either be intended, unintentional and even circumstantial. These threats can be categorized according to their type and source, such as: physical, natural, essential service issues, compromised information and non-malicious employees. The source or origin of the threat also plays a major part in how it is classified. A threat can be deliberate, accidental, environmental and also due to negligence.
Physical and environmental threats usually consist of threats that can range from natural disasters like hurricanes and tornados, to man-made threats like vandalism. These threats are dangerous because they can leave the network completely destroyed. Essential service issues, such as power issues, electricity outages or plumbing problems can also be a major threat to network operations due to downtime until services return and recovery cost. Compromised information due to user negligence as well as attacks such as APTs (Advanced Persistent Threats) is one of the biggest threats to network infrastructure. Another good example of compromised information is when poor security measures allow anonymous access to delicate information. Also, according to "Security Threats" (2015), “the primary threat to data integrity comes from authorized users who are not aware of the actions they are performing” (Non-Malicious Employees) are significant network based threats. They are also known as the “unintentional insider threat” (UIT).
How to Counter These Threats
To counter these attacks there are several things that need to be done. When dealing with Mother Nature there aren’t many options available to safeguard your network. According to "Security Threats" (2015), “the best course of action is...