Unit 7 - Threats (Internal threats (Deliberate (Employee actions (Defined…
Unit 7 - Threats
Unintentional disclosure or damage to data
When someone accidentally releases information about someone or something. Someone could accidentally change someone's/something's information.
When someone leaves something, like a laptop or a USB, somewhere where someone is able to get into and use the data. This is because there is no way for the computer to know who's using it unless there is a password.
Defined as any stealing, use or misuse of an employer's assets without permission. The term employer's assets are important because it implies that employee theft involves more than just cash. In many industries, there are much more important things than cash that employees can steal from a company ...
Tesla sue employee for exposing data.
Users overriding security controls
Access control is a security technique that regulates who or what can view or use resources in a computing environment. It is a fundamental concept in security that minimizes risk to the business or organization.
The illegal transfer or storage of any information that is confidential, personal, or financial in nature, including passwords, software code, or algorithms, proprietary process-oriented information, or technologies.
Use of external flash storage
Using a flash drive isn't the only USB security risk. Many modern laptops can now be charged through the USB port, a tremendous convenience but one that can leave a machine open for attack. Much like thumb drives, these small USB chargers are borrowed and shared, and lost and replaced.
Downloading/uploading files to/from the internet
Is when someone downloads a file from the internet that could possibly contain a virus or any malware that could be used to get information from their computer. Or, it's when someone uploads a file to the internet to somewhere which isn't safe where someone could look into.
Visiting untrusted : websites
Refers to when people visit a website that could be malicious and infect their computer with malware or viruses.