Please enable JavaScript.
Coggle requires JavaScript to display documents.
A) Potential Risk of Information System Security, B)Terms of Information…
A) Potential Risk of Information System Security
1.Data Theft via Third-Party Vendors
Loss of Data Due to Shadow IT
Poor Security Policies Compromise Trade Secrets
Data Heists Led by Insider Threats
Phishing Schemes Lead to Business Email Compromise (BEC)
B)Terms of Information System Security.
1.Information Theft
A crime where the criminals impersonates individuals or company , usually for financial gain via network.Network eavesdropping can lead to information theft. The theft can occur as data is transmitted over the internal or external network.The network intruder can also steal data from networked computers by gaining unauthorized access.
3.Information warfare
The use of information, and attacks on information, as a tool of warfare.
The use of electronic communications and the internet to disrupt a country's
telecommunications, power supply, transport system, etc.
4.Accidental data loss
Data loss is distinguished from data unavailability, which may arise from a network outage. Data unavailability is temporary, while data loss may be permanent.
Data accidentally deleted or deleted by viruses infection and data overwritten by user or an attacker.
Data loss is an error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing.
5.Data disclosure
Data disclosure means the voluntary sharing of any or all the information is considerated relevant to given situation.
Exposure data or file which consists of valuable information.
Revealing system data or debugging information helps an adversary learn about the system and form a plan of attack.
An information leak occurs when system data or debugging information leaves the program through an output stream or logging function.
6.Data modification
An intruder alter packets header address to direct the message to different destination. An act which aiming at achieving objectives that will benefits some parties, or it can be an act of sabotage to the existing functional network.
7.Data avalaibility
Data is to be available at a required level of performance in all situations.So that Can be accessed by authorized users at anytime and ready to be used by intended / authorized users.
2.Unauthorized disclosure
Communication or physical transfer of classified national intelligence, including personal information or any valuable information to an unauthorized recipient/receiver.
Private data is released to an individual who is not authorized to see/receive it.
GROUP LAKSA
Chong Shu Han & Lee Sing Ru