Threat Of Aggression In The ICT Environment

The drasticity of today's ICT Infrastructure is a huge challenge for the world ICT security industry. Almost all areas such as economy, politics, education, social, defense, medicine as well as science and technology depend on the development and progress of ICT in the world. In line with these high demands and advances, the threat of aggression in the ICT environment is equally enhanced to make ICT security as a policy requirement in all ICT environments.





According to the definition defined by the Government Computer Emergency Response Team (GCERT) of the Common Together, Infrastructure and Security Services Development Division (MAMPU), there are several types of intrusion threats as follows: -


Violation of PolicyThe use of ICT assets for the purpose of leakage of information and / or access to information in violation of the ICT Security Policy. 


Service Deprivation (Denial of Services)Threats to the security of computer systems where information processing services are deliberately denied to system users. It involves any action that prevents the system from functioning normally. Includes Denial of Services (DoS), Distributed Denial of Service (DDoS) and sabotage.


IntrusionUnderstand and modify the features of the hardware, software or any component of a system without the knowledge, direction or consent of any party. It includes unauthorized access, site intrusion, system tampering, system tampering, modification of data and amendments to system configuration.


Counterfeit (Forgery)Counterfeit and impersonation of the many identities involved in sending messages via email include abuse and identity theft, information theft (espionage) and hoaxes.


Spam
 
Spam is an email sent to the sender's email account unknown to senders at once and repeatedly (the same email content). This causes network congestion and slow response.

Malicious Code

Hardware or software incorporated into the system without permission for intrusion purposes. it affects virus attacks, trojan horses, worms, spyware and so on.

Harrasment / Threats

Harassment and threats through various means of personal and personal motions and letters and for some reason.

Attempts/Hacks Threats/Information Gathering

Experiment (whether failed or successful) to achieve unauthorized system or data. Includes spoofing, phishing, probing, war driving and scanning.

Physical Loss (Physical Loss)


Loss of access and use due to damage, theft and fire on ICT assets arises from the threat of aggression.


0 comments:

Post a Comment