Book Chapter

How to assess and mitigate information security threats

Excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems, from the eBook The Shortcut Guide to Protecting Business Internet Usage, by Dan Sullivan, this seven-tip collection provides an in-depth look at the information security threat types with which enterprise security professionals must contend.

Various information security threats -- worms, rootkits, Trojans, denial-of -service attacks -- and how they operate are all reviewed. Hacking tools and tactics, like social engineering, are also covered.

Once you're up-to-speed on the myriad information security threats and ways to mitigate them, you can review guidelines for determining which cost-effective countermeasures will best suit your enterprise needs.


How to assess and mitigate information security threats
  Introduction
  Malware: The ever-evolving threat
  Network-based attacks
  Information theft and cryptographic attacks
  Attacks targeted to specific applications
  Social engineering
  Threats to physical security
  Balancing the cost and benefits of countermeasures

This was first published in January 2007

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: