Defending Against Hackers, Stealth-
and Techno-Vandalism Attacks

Unlike other forms of Cyber Crime, these attacks take a 'scatter gun' approach, in that they do not target a specific organisation. If you happen to be 'in the firing line', and your Information Security safeguards are poor, you are likely to be hit.

Such attacks may take the form of time-, stealth- and logic- bombs, e-mail attachments with malicious code and Trojan Horses.

To view the related Policy click      

  • Malicious code which can replicate itself, may be downloaded unwittingly and executed. Having damaged your system, it can continue to wreak havoc with the systems of other organisations and individuals.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

  • E-mail may contain malicious code, which may replicate itself to all addresses within your organisation's e-mail system, and then corrupt the system of each recipient, without the attachment even having been opened.

    N.B. Such replication is not restricted to your organisation's network, it can spread to those of your clients and suppliers; possibly destroying your reputation and business.

There are 2 Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page