answersLogoWhite

0


Best Answer

A deliberate or accidental attack from inside

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the main threat to a closed network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is a closed standards in computer network?

What is a closed standards in computer network?


What is network threat?

A network threat is a security breach within a computer system. Examples off this is Denial-of-Service, Unauthorized Access or Confidentiality Breaches.


Define the difference between an open network and a closed network?

There are two kinds of 'household networks', Open and Closed. Open networks can be joined by anyone at anytime. Closed networks require permission to join. When you attempt to join a closed network, a notice is sent to the Closed Network's administrator requesting that you be allowed to join. That person will respond either accepting or denying your request. (remember, once you've joined a network, you cannot leave that network for 30 days - security reasons).


What type of threat are thumb drives usb pen drives to the army IT systems and network?

Technology Threat


Why did PlayStation close?

PSN or the Playstation Network is not closed


What kind of animal is a threat to a panther?

The main animal that is a threat to a panther would be man.


Your iis website is unaccessable from outside your network?

figured out cancel closed no need to answer question closed figured out


What is a intelligence threat?

Threat intelligence signifies the mix of data description potential threats and also the correct knowledge and understanding of organization’s network structure, operations, and activities. It’s usually described by loCs or threat feeds, which give evidence-based data concerning associate organization’s distinctive threat landscape. To get this evidence-based data that’s employed by network defenders, the Generation of Threat Intelligence feeds that contain data on the techniques and indicators ought to be contextualized by verification it with the baseline data of network activity, The collection and structuring of threat feeds is that the generation of threat intelligence, that is employed in security analytics to boost the potency of threat detection. In network defense setting, security analytics can exist in one among the 2 forms : • Threat intelligence platform that consumes information collected from network to find trends • Security data and event management (SIEM) infrastructure to sight abnormal activity on the network.


What is the main threat towards hedgehogs?

Automobiles.


What is the main threat to pink river dolphin?

ME!


What are the main threats of tornadoes?

The main threat in a tornado is flying or falling debris.


What is the main advantage of connecting computers into network?

The main advantage of connecting computers into network is to share and control all kind of resources of the network you have created for your users.