Please enable JavaScript.
Coggle requires JavaScript to display documents.
Unauthorized access and used - Coggle Diagram
Unauthorized access and used
Unauthorized access
use of a computer or network without permission
by connecting to it and then logging in as a legitimate user.
do not cause damages
merely access the data, valuable information or programs in the computer.
Unauthorized used
Use of a computer or its data for unapproved or illegal activities.
Ex: gaining access to a bank computer and performing an unauthorized bank transfer etc
Stolen IT equipment and
improper way to dispose
old equipment.
Self Awareness
Online Banking
Identity Theft
Phishing
Technology
Firewall
Antivirus
Antispyware
Parental Control
Regular Updates
Browser
Protection from security breaches & attacks
Implement policy
Good Password Practice
Use strong password
Hard to guess
Kept it secret.
Implement policy on shared resources
Best Practice
Limit user access to sensitive areas of the network, so users can only access specified areas as required by their job
Educating users on organisation security policies and precautions, so they are aware of how data breaches can happen and the implications