Please enable JavaScript.
Coggle requires JavaScript to display documents.
Unit 6 mindmap - Coggle Diagram
Unit 6 mindmap
6.2 Unauthorized access.
What is unauthorized access:
Unauthorized access is when someone gains access to a website or someone's account without permission. This could happen if someone tried guessing someone's password until they got inside, this is unauthorized access. Another example is when someone left their computer on with sensitive information and someone else came and went on the computer where all the information is, this could then potentially be leaked. An example of unauthorized access would be.
Accidental lost:
This is when you lose information from human error, for example an MI6 agent left their laptop on the train this means anyone can go onto the laptop and look through all the files, another example is at an airport one of the staff dropped a USB leaking all the defensive tactics in the airport.
Intentional tampering:
Data tampering is the act of deliberately modifying (destroying, manipulating, or editing) data through unauthorized channels. ... In both instances, the intrusion is malicious and the effects on the data always dire. It's one of the biggest security threats that any application, program, or organization can face.
Natural disasters:
One major natural disaster is able to have a big impact of data loss, for example flooding is able to wipe out servers, to implement this computers or servers are usually placed on the second floor or on a floor higher than the ground floor, this is so if a flood happens the flood won’t be able to make it up to the higher floors unless it’s a very severe flood
6.3 Impacts
Loss of reputation
A loss of reputation is when customers start to lose faith in a business this will consequently lead to a tarnished reputation.
-
6.4 Protection measures
Staff access rights to information:
Only a certain amount of people can access specific information and they have to make sure that they don’t leak the information and to keep confidential information secure. Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data.
Responsibilities of staff for security of information:
Staff will have to ensure that the data that they’ve been given isn’t o to be leaked out for anyone who isn’t supposed to see the confidential data, the staff will have the responsibility to do so. Information security protects the organisation of their data so that the business can function.
-