You are on page 1of 1

CONG.

PABLO MALASARTE
NATIONAL HIGH SCHOOL
Cabad, Balilihan, Bohol

SECOND GRADING
Activity No. 2.4
Name: Grade/Score:
Year and Section: Date:
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Activity Title: Security Attacks


Learning Target: Identify the different types of threats and potential threats to computer network
References:
(Author, Title, Pages)
CHS Module 142

CONCEPT NOTES:
Security Attacks
To successfully protect computers and the network, a technician must understand both of the
following types of threats to computer security:
 Physical: Events or attacks that steal, damage, or destroy such equipment as servers, switches,
and wiring.
 Data: Events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
Threats to security can come from inside or outside an organization, and the level of potential damage
can vary greatly. Potential threats include the following:
 Internal: Employees who have access to data, equipment, and the network. Internal attacks can
be characterized as follows:
 Malicious threats are when an employee intends to cause damage.
 Accidental threats are when the user damages data or equipment unintentionally.
 External: Users outside an organization who do not have authorized access to the network or
resources. External attacks can be characterized as follows:
 Unstructured attacks, which use available resources, such as passwords or scripts, to gain
access to and run programs designed to vandalize.
 Structured attacks, which use code to access operating systems and software.
Physical loss or damage to equipment can be expensive, and data loss can be detrimental to your
business and reputation. Threats against data are constantly changing as attackers find new ways to gain
entry and commit their crimes.

EXERCISE:
1. Describe the types of threats to computer security.
2. What are the potential threats of computer and its characteristics?

You might also like