...
首页> 外文期刊>Information systems security >A Comprehensive List of Threats To Information
【24h】

A Comprehensive List of Threats To Information

机译:信息威胁的综合清单

获取原文

摘要

Policies, standards, surveys, and assessment questionnaires do not currently provide consistent or complete lists of threats to information for identifying controls, conducting assessments, or establishing priorities in information security. The usual short list of four common threats — unauthorized modification, unauthorized use, destruction, and disclosure — is clearly incomplete and redundant. For example, more extensive lists often include fraud, theft, sabotage, and espionage. However, these threats are legal abstractions that require expertise in criminal law to understand. Often, users and even security specialists don't understand the criminal legal implications of these terms or have a distorted view of them.
机译:政策、标准、调查和评估问卷目前没有提供一致或完整的信息威胁列表,用于识别控制、进行评估或确定信息安全的优先级。通常的四种常见威胁(未经授权的修改、未经授权的使用、破坏和披露)的简短清单显然是不完整和多余的。例如,更广泛的列表通常包括欺诈、盗窃、破坏和间谍活动。然而,这些威胁是法律上的抽象概念,需要刑法方面的专业知识才能理解。通常,用户甚至安全专家都不了解这些术语的刑事法律含义,或者对它们有扭曲的看法。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号