четверг, 4 марта 2010 г.

перевод, который не успели сделать на занятии

(нужно сделать ко вторнику, 9.03)

События


События - это способы, с помощью которых агенты угроз могут причинить вред организации. Например, хакеры нанесут ущерб путем злонамеренного изменения информации веб-сайта организации. Следует также принять во внимание вред, который может быть нанесен при получении агентом доступа. Необходимо учитывать следующие события:
· злоупотребление санкционированным доступом к информации, системам или сайтам;
· злонамеренное изменение информации;
· случайное изменение информации;
· несанкционированный доступ к информации, системам или сайтам;
· злонамеренное разрушение информации, систем или сайтов;
· случайное разрушение информации, систем или сайтов;
· злонамеренное физическое вмешательство в системы или операции;
· случайное физическое вмешательство в системы или операции;
· естественные физические события, которые мешают системам или операциям;
· ввод в действие злоумышленного программного обеспечения (намеренно или нет);
· нарушение внутренних или внешних коммуникаций;
· несанкционированный пассивный перехват информации внутренних или внешних коммуникаций;
кража аппаратного или программного обеспечения.

7 комментариев:

  1. Events

    Events are ways with which agents of threats can cause harm to organisation. For example, hackers will cause harm by ill-intentioned change of information of web site of organisation. It is necessary to take also into consideration harm which can be caused in obtaining by agent of access. It is necessary to consider following events:
    Abuse of authorised access to information, systems or sites;
    Ill-intentioned change of information;
    Accidental change of information;
    Unauthorized access to information, systems or sites;
    Ill-intentioned destruction of the information, systems or sites;
    Accidental destruction of the information, systems or sites;
    Ill-intentioned physical intervention in systems or operations;
    Accidental physical intervention in systems or operations;
    Natural physical events which prevent to systems or operations;
    Commissioning of ill-intentioned software (it is intentionally or not);
    Violation of internal or external communications;
    Passive unauthorized interception of information from internal or external communications;
    Theft of hardware or software.

    ОтветитьУдалить
  2. Events are the ways for the hackers to damage organizations. For example, hackers could inflict damage by malicious modification of the organization's website's information. You also should consider the damage that could be inflicted if the hacker gets access. You should consider such events as:
    -Abuse of authorized access to information, systems or sites;
    -Malicious modification of the information;
    -Accidental modification of the information;
    -Unauthorized access to information, systems or sites;
    -Malicious destruction of information, systems or sites;
    -Accidental destruction of information, systems or sites;
    -Abusive physical intervention into the system or operations;
    -Accidental physical intervention into the system or operations;
    -Natural physical events, which prevent systems or operations;
    -Execution of malicious software (intentionally or not);
    -Violation of internal or external communications;
    -Passive unauthorized interception of information from internal or external communications;
    -theft of hardware or software.

    ОтветитьУдалить
  3. Events are the ways which help agent of threats to damage the organizations. For example hackers will damage the organizations by malicious changing of information on the organizations web-site. It should be taken into account the damage which may be caused by an agent in obtaining access.
    It is necessary to take into account next events:
    -abuse of authorized access to the information, systems or sites;
    -malicious changing of information;
    -random changing of information;
    -unauthorized access to information, systems or sites;
    -malicious destruction of information, systems or sites;
    -random destruction of information, systems or sites;
    -malicious physical intrusion in the systems or operations;
    -random physical intrusion in the systems or operations;
    -natural physical events which prevent systems or operations;
    -entry to action malicious software(intentionally or not);
    -damage internal or external communications;
    -passive unauthorized interception of information from internal or external communications;
    steal of hardware or software.

    ОтветитьУдалить
  4. Events are the ways which help hackers to damage organizations. For example hackers will damage organizations by hacking information on the web-site. Also should take into consideration the harm of unautorised access to web-resources. It is necessary to take into account next events:
    - frequent autorised access to information, the system or sites;
    - hacking information;
    - accident change information
    - unautorised access to information, the system or sites;
    - destruction information, systems or sites;
    - accident physical intervention to the system or operations;
    - natural physical events, that prevents the system or operations;
    - activating malware;
    - destruction of internal or external communications;
    - sniffing into internal or external communications;
    - theft hardware or software.

    Alex Kondratev.

    ОтветитьУдалить
  5. Events - this is the means by which agents can cause harm to the organization. For example, hackers could inflict damage by malicious changes of the information website of the organization.It is necessary to take also into consideration harm which can be caused in obtaining by agent of access. It is necessary to consider following events:
    · Abuse of authorized access to information, systems or sites;
    · Malicious change information;
    · Random change information;
    · Unauthorized access to information, systems or sites;
    · Malicious destruction of information, systems or sites;
    · Accidental destruction of information, systems or sites;
    · Abusive physical intervention in the system or operations;
    · Accidental physical intervention in the system or operations;
    · Natural physical events, which prevent systems or operations;
    · Commissioning of malicious software (intentionally or not);
    · Violation of internal or external communications;
    · Passive unauthorized interception of information from internal or external communications;
    · theft of hardware or software.

    ОтветитьУдалить
  6. Р.Качин
    Events are the ways which help hackers to damage organizations. For example, hackers could inflict damage by malicious changes of the information website of the organization.Also should take into consideration the damage of unautorised access to web-resources.you should consider such events as:Abuse of authorized access to information systems or sites;
    Malicious change information;
    Accidental change information;
    Unauthorized access to information, systems or sites;
    Malicious destruction of information, systems or sites;
    Accidental destruction of information, systems or sites;
    Abusive physical intervention into the system or operations;
    Natural physical events, which prevent systems or operations;
    Commissioning of malicious software (intentionally or not);
    Violation of internal or external communications;
    Passive unauthorized interception of information from internal or external communications;
    Theft of hardware or software.

    ОтветитьУдалить
  7. Д. Кислицын

    Events.

    Events are methods, wiht which one help agents of threats can harm organisation. For example, hackers will put a damage by ill-intentioned change of the information of a web site of the organisation. It is necessary to take in attention harm which can be superimposed at obtaining by the agent of access. It is necessary to consider following events:
    - abusing the authorised access to the information, systems or sites;
    - ill-intentioned change of the information;
    - random change of the information;
    - unautorized access to the information, systems or sites;
    - random corrupting of the information, systems or sites;
    - ill-intentioned physical interference in systems or operations;
    - random physical interference in systems or operations;
    - natural physical events which prevent to systems or operations;
    - commissioning of the ill-intentioned software (it is intended or not);
    - violation of internal or external commynications;
    - theft a hardware or a software.

    ОтветитьУдалить