internal threats
use a portable storage device
visiting untrustworthy websites
download from the internet
users overriding security controls
intentionally leaking information
unintentional disclosure of data
Portable storage devices allow people
to steal large amounts of data very quickly.
Logging who downloads which files,
when and from which terminals
Disabling access to USB ports or
removable media.
Too much or confidential information is
given to an employee or customer
click to edit
Data stored on paper, hard disks or removable media is left on trains or in cars.
IT systems being compromised
Incorrect file privileges being given to users
Information not being destroyed before it is disposed of
Websites that are untrustworthy may be harmful or
contain downloads which contain malware.
by getting into other peoples information by getting through their security.
they can get into your information by getting you on the website and using cookies.
getting through peoples security and changing the password to get in so you can get in all the time.
they use physical fences,Technical – firewalls, settings, antivirus,Procedural – incident processes,Legal – laws.
click to edit