Please enable JavaScript.
Coggle requires JavaScript to display documents.
Information Security Overview - Coggle Diagram
Information Security Overview
Potential Risk
Loss of Data Due to Shadow IT
information technology systems organization without the knowledge
Data Theft via Third-Party Vendors
more companies migrate their digital assets to the cloud, more data is entrusted to third-party cloud providers
Poor Security Policies Compromise Trade Secrets
-protect trade secrets
-Allowing personnel and collaborators to access the digital resources of the organization
-poor policies such as a single factor password
Data Heists Led by Insider Threats
data breaches were caused by social engineering
social engineer may impersonate and trick an employee into revealing their password
Phishing Schemes Lead to Business Email Compromise (BEC)
phishing scheme uses media channels such as email, telephone
schemes can be used to launch a Business Email Compromise (BEC) attack
Terms in Information System Security
Accidental data loss
Data loss is distinguished from data unavailability, which may arise from a network outage
Data storage physically damaged or stolen
Data disclosure
voluntary sharing of any or all the information
Revealing system data or debugging information
Information warfare
tactical and strategic use of information to gain advantages
use of electronic communications and the internet to disrupt a country's
telecommunications, power supply
Data modification
Modifying the actual data stored in system
intruder alter packets header address to direct the message to different destination.
Unauthorized disclosure
Private data is released to an individual who is not authorized
exposure of information to entities not authorized access to the information
Data availability
process of ensuring that data is available to end users and applications
Can be accessed by authorized users at anytime
Information Theft
criminals impersonates individuals
Network eavesdropping