Chapter 8
Reading Organizer
After completion of this chapter, you should be able to:
• Identify and describe the various networking threats. • Identify different methods of attack. • Describe security procedures and applications. • Describe the features of a firewall and how it can be used to protect against an attack.
8.1
1.
Once the hacker gains access to the network, four types of threat may arise. List and explain each of these four threats.
a. Information theft- Breaking into a computer to obtain confidential information. Information can be used or sold for various purposes. Example: Stealing a organization’s proprietary information, such as research and development information.
b. Identity theft- Breaking into a computer to destroy or alter data records. Examples of data loss: sending a virus that reformats a computer’s hard drive. Examples of data manipulation: breaking into a records system to change information, such as the price of an item.
c. Data loss / manipulation – A form of information theft where personal information is stolen for the purpose of takeing over someone’s identity. Using this information an individual can obtain legal documents, apply for credit and make unauthorized online purchases. Idnetity theft is a growing problem costing billions of dollars per year.
d. Disruption of service – Preventing legitimate users from accessing services to which they should be entitled.
2. Activity
Identify the type of security threat described by connecting the correct threat with its definition. [pic] [pic]
3. Explain what External Threats are.
External threats arise from individuals working outside of an organization. They do not have authorized access to the computer systems or network. External attackers work their way