The List Of People Threats

Computers & TechnologyTechnology

  • Author Mahesh Thakur
  • Published April 3, 2010
  • Word count 537

Appin Knowledge Solutions is the best provider of high technology certification and computer based training across the world. With an innovative learning concept using Computer Based Training Software, Appin provides training to customers as well as young professionals in niche areas including Information Security & Ethical Hacking, Embedded Systems, Robotics, Application Programming, Nano-technology, Networking & Communication and other emerging technologies.

The objective of Appin Knowledge Solutions is to provide integrated educational programs with a unique knowledge base. Through their courses, Appin aims to enhance individual performance and corporate productivity in the technology domain. The course material is the best as it is formulated by the best academicians in the industry. The program has been conceptualized to produce complete professionals for the technology industry. Explained below is the type of human errors which can take place.

System Administration Error: All human errors occurring in the setup, administration, and operation of LAN systems, ranging from the failure to properly enable access controls and other security features to the lack of adequate backups. The possible consequences include loss of data confidentiality, integrity, and system availability, as well as possible embarrassment to the government or the individual.

PC Operator Error: All human errors occurring in the operation of PC/LAN systems, including improper use of logon/passwords, inadvertent deletion of files, and inadequate backups. Possible consequences include data privacy violations and loss of capabilities (such as the accidental erasure of critical programs or data).

Software Programming Error: All the bugs, incompatibility issues, and related problems that occur in developing, installing, and maintaining software on a LAN. Possible consequences include degradation, interruption, or loss of LAN capabilities.

Unauthorized Disclosure: Any release of sensitive information on the LAN that is not sanctioned by proper authority, including those caused by carelessness and accidental release. Possible consequences are violations of law and policy, abridgement of rights of individuals, embarrassment to individuals and the government, and loss of public confidence in government.

Unauthorized Use: Employment of government resources for purposes not authorized by the Agency and the use of non-government resources on the network (such as using personally-owned software at the office). Possible consequences include the introduction of viruses, and copyright violations for use of unlicensed software.

Fraud/Embezzlement: The unlawful deletion of government recorded assets through the deceitful manipulation of government controls, files and data, often through the use of a LAN. Possible consequences include monetary loss and wrongful contract/grant awards.

Modification of Data: Any unauthorized changing of data, which can be motivated by such things as personal gain, favoritism, a misguided sense of duty, or a malicious intent to sabotage. Possible consequences include the loss of data integrity and potentially flawed decision making. A high risk is the disgruntled employee.

Alteration of Software: Any unauthorized changing of software, which can be motivated by such things as disgruntlement, personal gain, or a misguided sense of duty. Possible consequences include all kinds of processing errors and loss of quality in output products.

Theft of ADP Assets: The unauthorized/unlawful removal of data, hardware, or software from government facilities. Possible consequences for the loss of hardware can include the loss of important data and programs resident on the hard disk or on diskettes stored in the immediate vicinity.

Appin Knowledge Solution is an affiliate of Appin group of companies based in Austin,Texas (US) known worldwide for imparting education in niche technologies like ethical hacking and information security.

Article source: https://articlebiz.com
This article has been viewed 588 times.

Rate article

Article comments

There are no posted comments.

Related articles