Information Technology Reference
In-Depth Information
table 13.3
iA 2 threat taxonomy
Unaccompanied/ 
Tool
Threat Agent
Vulnerability
Action
Target
Undesired Result
Hacker
Password cracker
Simple passwords
Unrestricted
access
R&D server
Disclosure and loss of
proprietary data
Hurricane
Unaccompanied
Construction (e.g., roof)
Flood
Data center
Loss of all computing
equipment
Ice storm
Unaccompanied
Public services (highway
administration)
Ice cover
Roads
Key personnel kept
from critical operations
Venti caramel latte
Careless live-ware
Lack of a consumables
policy
Spill
Unwitting laptop
Fried laptop and hard
drive with critical data
($10K recovery cost)
Etc.
 
Search WWH ::




Custom Search