internal threats

use a portable storage device

visiting untrustworthy websites

download from the internet

users overriding security controls

intentionally leaking information

unintentional disclosure of data

Portable storage devices allow people
to steal large amounts of data very quickly.

Logging who downloads which files,
when and from which terminals

Disabling access to USB ports or
removable media.

Too much or confidential information is
given to an employee or customer

click to edit

Data stored on paper, hard disks or removable media is left on trains or in cars.

IT systems being compromised

Incorrect file privileges being given to users

Information not being destroyed before it is disposed of

Websites that are untrustworthy may be harmful or
contain downloads which contain malware.

by getting into other peoples information by getting through their security.

they can get into your information by getting you on the website and using cookies.

getting through peoples security and changing the password to get in so you can get in all the time.

they use physical fences,Technical – firewalls, settings, antivirus,Procedural – incident processes,Legal – laws.

click to edit