Architecture Evaluation - Department of Computer Information Systems
Architecture Evaluation - Department of Computer Information Systems
Architecture Evaluation - Department of Computer Information Systems
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Types <strong>of</strong> Threats<br />
Threats to hardware<br />
Theft <strong>of</strong> equipment<br />
Tampering by disgruntled employees<br />
Destruction by natural accidents (fire, flood etc.)<br />
Ordinary wear and tear<br />
Threats to s<strong>of</strong>tware<br />
Deletion - accidental or deliberate<br />
Theft by user<br />
Corruption by virus or hardware malfunction<br />
Threats to information<br />
Corruption, theft or deletion <strong>of</strong> files<br />
Enterprise <strong>Architecture</strong>s<br />
Pr<strong>of</strong>essor<br />
Truex