Please enable JavaScript.
Coggle requires JavaScript to display documents.
Internal Threats To Data And Systems (IT systems being compromised…
Internal Threats To Data And Systems
IT systems being compromised
Incorrect file privileges being given to users
Information not being destroyed before it is disposed of
stealing information
What should companies do with sensitive or
confidential documents?
When attackers go through bins to find data it is
known as dumpster diving
Unintentional disclosure
of data
Too much or confidential information is
given to an employee or customer
Data stored on paper, hard disks or
removable media is left on trains or
in cars
Computer security or encryption is not
used or sufficient to stop a data
breach occurring
Case study: Corporate spy
In 2012, Dyson accused a specialist engineer of
industrial espionage
The engineer, Yong Pang, was alleged to have given
Dyson’s ideas to the German competitor Bosch
The information was also thought
to be given to Bosch’s
Chinese motor developer
Case Study: Leaking information
Edward Snowden was a lead technologist for Dell
and the CIA
• In 2012 he downloaded over
1 million documents from the CIA
and the Department of Defence
Many of these documents revealed
secret government spying programs
Many of these documents revealed
secret government spying programs
• Snowden faces charges of theft of
government property and espionage
• Give two ways this leak could
have been limited
Snowden faces charges of theft of
government property and espionage