Please enable JavaScript.
Coggle requires JavaScript to display documents.
earth 1 DFP 50123 SECURITY MOBILE COMPUTING, POP QUIZ - Coggle Diagram
DFP 50123 SECURITY MOBILE COMPUTING
-ROTI CANAI-
MUHAMMAD NAQIB FARHAN BIN MAKHTAR
21DDT19F2018
NUR SYAZWANA BINTI SAHIDAN
21DDT19F2044
LIST POTENTIAL RISK OF INFORMATION SYSTEM SECURITY
data theft via third-party vendors
loss to data due to shadow IT
poor security policies compromise trade secrets
data heists led by insider threats
phishing schemes lead to business email compromise (BEC)
EXPLAIN EVERY TERM IN INFORMATION SYSTEM SECURITY
information theft
A crime where the criminals impersonates individuals or company , usually for financial gain via network.
The theft can occur as data is transmitted over the internal or external network
Network eavesdropping can lead to information theft.
Information theft such as social security number, signature, name, address, phone number or even banking and creadit card information.
The network intruder can also steal data from networked computers by gaining unauthorized access.
unauthorized disclosure
Private data is released to an individual who is not authorized to see/receive it.
Communication or physical transfer of classified national intelligence, including personal information or any valuable information to an unauthorized recipient/receiver.
An event(s) involving the exposure of information to entities not authorized access to the information.
information warfare
The use of information, and attacks on information, as a tool of warfare.
The tactical and strategic use of information to gain advantages.
Also known ad cyber walfare, electronic alfare and cyber attack.
The use of electronic communications and the internet to disrupt a country's
telecommunications, power supply, transport system, etc.
accidental data loss
Data loss is an error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing.
Data loss is distinguished from data unavailability, which may arise from a network outage. Data unavailability is temporary, while data loss may be permanent.
Any process or event that result in data being corrupted, deleted and unreadable wither software or application.
Data storage physically damaged or stolen.
Data stolen over the network by network penetration.
Data accidentally deleted or deleted by viruses infection and data overwritten by user or an attacker.
data disclosure
The voluntary sharing of any or all the information is considerated relevant to given situation.
Exposure data or file which consists of valuable information.
Revealing system data or debugging information helps an adversary learn about the system and form a plan of attack.
An information leak occurs when system data or debugging information leaves the program through an output stream or logging function.
data modification
An intruder alter packets header address to direct the message to different destination.
An act which aiming at achieving objectives that will benefits some parties, or it can be an act of sabotage to the existing functional network.
data availability
The process of ensuring that data is available to end users and applications when and where the need it.
Data is to be available at a required level of performance in all situations.
Can be accessed by authorized users at anytime.
Ready to be used by intended / authorized users.
POP QUIZ