Please enable JavaScript.
Coggle requires JavaScript to display documents.
IT - Unit 2 LO6 - Coggle Diagram
IT - Unit 2 LO6
-
6.3 Impacts
Failure in security of confidential information - Failure in security of confidential information is a breach in security, keys being stolen, or poor policy. An example of this would be a Tesco employee hacking into Sainsburys’ price lists and changing Tesco’s prices accordingly.
Threat to national security - Multiple times, people have accidentally leaked information that could potentially be a massive threat to national security. For example, in December 2000, an MI5 agent left a briefcase that contained top-secret information on a train. Imagine the threat that could emerge if a terrorist was also on that train, and found that briefcase.
http://news.bbc.co.uk/1/hi/uk/1064917.stm
Loss of service and access - Loss of service and access is being unable to access or get into a server. Examples of this would be high levels of Amazon users overloading a server, or earthquakes causing power cuts.
Loss of information belonging to a third party - Loss of information belonging to a third party means that companies that work with a hacked company are also at risk of a hack. For example, Sony manufactures stereos for BMW cars - if BMW were to get hacked, Sony would be at risk too.
-
-
-
6.2 Risks
-
-
-
Accidental Loss - An inexperienced employee may not know what data is important, so vital files could accidentally be deleted.
Natural Disasters - In areas of the world that are near plate boundaries, natural disasters can be inevitable, and very harmful to both data and employees.
-
6.1 CIA
Integrity - Making sure information is maintained, so that it is kept up-to-date, accurate, complete and relevant. An example would be the medical records of students at a school constantly being updated.
Availability - Making sure information is always available to the individuals or groups that need it. An example would be parents’ phone numbers, in case their child is in an emergency.
Confidentiality - Making sure information is only accessible to individuals or groups who are authorised to access it. An example would be the salaries of teachers only being accessible to the headteacher and HR.