Today, 22 September 2017 | you entered as the GUEST

124,047 people used our Software
Select the system:

Facebook linkedin Instagram Myspace Twitter Hi5

Badoo Ask.fm

Enter the address:

 

Protection of information

Building a model of the intruder.

A clear methodology to quantify the extent of the risk as there was not. This is due primarily to the lack of sufficient statistical data about the likelihood of a threat. As a result, the most widely qualitative assessment of information risks.

The intruder model is a description of the types of criminals who intentionally or accidentally, by act or omission, which may cause damage to the information system. Most often on a global basis they are ranked on external and internal (respectively, category A and b). However, such a division is not sufficient. Therefore, ranking is done with the diversification of these categories into subcategories. For example, to external attackers are ranked violators of the following groups: customers who can damage deliberately or through ignorance; contractors hired to perform any of the activities (they, in turn, also can make as intentional and unintentional violation); skilled hackers, etc. Internal attackers are divided into those who have caused the damage intentionally and unintentionally; in addition, this category can be diversified on the basis of assigned privileges in the information system.

Hazards identification emergency

For risk management is required to identify possible dangers that threaten the surveyed information system.
On the basis of expert opinion. This is because quantitative assessment of the probability of threats is difficult because of the relative novelty of information technology and, as a consequence, the lack of sufficient statistical data.
Thus identified the following mechanisms for the implementation of threats:

  • Conduct SQL Injection attacks;
  • The attack Cross-Site Scripting;
  • Escalation of privileges the rights of the attacker in the system as a result of buffer overflow OS or DBMS;
  • The creation of the storm network packets directed to the Web server;
  • The formation of incorrect packets directed to the Web server and triggering the collapse of the service.
    On the basis of expert opinion. This is because quantitative assessment of the probability of threats is difficult because of the relative novelty of information technology and, as a consequence, the lack of sufficient statistical data.
  • Our work is inclusive of all possible risks that would prevent the loss.

     

    ____________________________________________________________________________________________________________________________



    Recent reviews
    Make the system of discounts!
    - Ikha Verderika
    Can I leave the page for myself?
    - Orucov
    Veloce e di qualità!
    - Inriàl
    Satisfied with the service. quick and easy!
    - Bouhssi
    Our client gets full support from us.
    - HP
    Mi piace molto.
    - Romario
    Service works, very quickly and reliably!
    - Berivan
    Can I use your services once for free?
    - Melisa Smothken
    Generally, this is available.
    - Oestro Rennes
    I use your services already not for the first time!
    - Jack Oliver
    I want a discount.
    - Volf
    Want a discount, not for the first time use!
    - leoliu
    When using the service is delayed! In General, acceptable.
    - Keeper
    all super works)
    - Arbcon
    Our client gets full support from us. You can contact us at any time
    - HP
    and free one time?
    - readysteady
    I can leave the page itself?
    - ErnieG
    Your service! Happy!
    - thefastlife
    convenient and effective!) go as ever again.
    - MaryMaryMarylin
    Cool, but can your page to protect?
    - SamanthaDoll
    Now how to protect your address??
    - Japanfan
    Damn, they violated virgin immunity profile! ;)).
    - Mystic Dreamer
    Open the newsletter, if the password will change.
    - Dik
    Great to deal with !
    - Higon. I.
    Everything works fine, thanks
    - Adam S.



     

     

           


    Share :
     
    Share :
    Information :
    More

     

     

    Twitter

    Hi5

    Baboo

    Ask.fm

     

     

    Home

    Cabinet

    News

    Sitemap

     

     

     

     

     

      Copyright © 2017. Inc Hack. All rights reserved.
    The use of this website implies that you accept
    User agreement.
     
    Скопировать в буфер