Please identify and explain some different types of risks th
Please identify and explain some different types of risks that a computer network environment might face. What are some ways that these risks can be mitigated?
Solution
As the computer network connects to the greater world of internet, the network is more prone to attacks. Thus there are many threats and risks to the computer network environment.Risks faced by the computer network environment are:
1.Computer slowdown and computer instability:
The attacks on the computer network causes various viruses to interrupt the network and causes the system to slow down. It causes impact on the performance of the system.Active conduit for download and installation of additional security risks.
2.Active conduit for download and installation of additional security risks:
The threats causes failure in the downloading process from internet. Also it causes error during installation any software from the internet.It also affects the performance of the system.
3.Release of confidential, protected, or sensitive information:
During the computer networking there is a lot of risk of information lossage and threat of release of the confidential information. It affects the authenticity of the information and the system.It affects the privacy of the system.
4.Release of browser-tracking information, logged keystrokes, or other forms of data:
During the computer networking there is a lot of risk of loss of information and affects the privacy of the network and system.
5.Violations of privacy policies or legal requirements:
It is also a risk to computer network environment by violating the privacy policies and legal information.It also affects the privacy of the system.
6.Infections can allow programs to spread to other computers, mobile devices, or network file shares:
It causes impact on the operations caused on the system during network processing.
7.Infections can lead to data loss, corruption, or other forms of operational impairment to infected hosts:
Information is lost, data is lost and corrupted due to attacks caused during networking process.It also causes impact on the operation of the system.
8.In additional to legal issues surrounding violations of privacy laws, owners of infected hosts might find themselves liable for harm or loss caused by their infected computer’s actions.
