Vandalism, sabotage or disgruntled employees damaging equipment, programs, or data,
Computer hacking, virus infection, denial of service,
Manipulation of records or data by inside or outside personnel for fraudulent purposes, and
Disruption to the continuity of business in the event of a disaster.
For any organisation, the security objectives are met when:
Information systems are available and usable to authorised users whenever required
(availability);
Data and information are disclosed only to those who have a right to know it (confidentiality); and
Data and information are protected against unauthorised modification or destruction (integrity).
Vandalism, sabotage or disgruntled employees damaging equipment, programs, or data, Computer hacking, virus infection, denial of service, Manipulation of records or data by inside or outside personnel for fraudulent purposes, and Disruption to the continuity of business in the event of a disaster. For any organisation, the security objectives are met when: Information systems are available and usable to authorised users whenever required (availability); Data and information are disclosed only to those who have a right to know it (confidentiality); and Data and information are protected against unauthorised modification or destruction (integrity).
การแปล กรุณารอสักครู่..
