logo

Threat and Vulnerability to Facebook

   

Added on  2023-01-11

5 Pages947 Words50 Views
Running head: THREAT AND VULNERABILITY TO FACEBOOK
THREAT AND VULNERABILITY TO FACEBOOK
Name of the Student
Name of the University
Author Note

THREAT AND VULNERABILITY TO FACEBOOK
1
;
1. Identification of threats that Facebook as organization may encounter as well as potential
vulnerabilities:
For threat identification, all entities (natural, human, or environmental) that could harm the
organization’s capability to fulfil its critical functions has been identified in this context. Here the
analysis is done in the following ways which includes:
Identification of potential attack methods.
Assessment of their capacity and motivation (for humans) to mount an attack.
1.1. Natural threats:
As Facebook has so many data to host, it stores its huge data in secured database in
advanced data centres in various locations around the world. These data centres considers physical
data servers for storing data and any damage to the servers due to natural disasters is threat to the
Facebook as it has the potential to harm the critical operation of the organization.
Natural disasters include storm, thunders and other disruptive forces as well.
1.2. Human threat:
It is one of the most significant threat that needs to be considered while analysing possible
threats to the Facebook. These type of cyber criminals are also known as hackers. There are various
methods that are considered by these type of hackers to attack Facebook to affect its operation.
Method of attack Popularity Motivation
Keylogging It is an popular method to
steal personal information
regarding account credential
and password
It is easy to use and requires
less effort and it allows
hackers to record keystrokes
provided by the users to
login to the account and

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Threats to Information Security
|10
|1736
|398

Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453

Hacking Credit Cards with RFID chip
|5
|819
|443

Information and Systems Security
|7
|1270
|80

COIT20262 - Advanced Network Security Assignment 1 Submission
|7
|1514
|20

Challenges and Approaches to Overcome Session Hijacking and Intrusion Detection Systems
|4
|603
|263