09.03.2015 Views

Architecture Evaluation - Department of Computer Information Systems

Architecture Evaluation - Department of Computer Information Systems

Architecture Evaluation - Department of Computer Information Systems

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Types <strong>of</strong> Threats<br />

Threats to hardware<br />

Theft <strong>of</strong> equipment<br />

Tampering by disgruntled employees<br />

Destruction by natural accidents (fire, flood etc.)<br />

Ordinary wear and tear<br />

Threats to s<strong>of</strong>tware<br />

Deletion - accidental or deliberate<br />

Theft by user<br />

Corruption by virus or hardware malfunction<br />

Threats to information<br />

Corruption, theft or deletion <strong>of</strong> files<br />

Enterprise <strong>Architecture</strong>s<br />

Pr<strong>of</strong>essor<br />

Truex

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!