Internal Threats to Information Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/7

flashcard set

Earn XP

Description and Tags

Flashcards covering vocabulary related to internal threats to information security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

8 Terms

1
New cards

Intentional Stealing/Leaking of Information

The act by individuals with access to sensitive data to copy, delete, or leak it for reasons such as financial gain, whistleblowing, or personal grievances.

2
New cards

Whistleblowing

Leaking information to expose illegal or unethical practices.

3
New cards

Edward Snowden

A former CIA employee who leaked classified information from the NSA due to concerns about mass surveillance.

4
New cards

Users Overriding Security Controls

Actions taken by authorized users to alter security settings, often to grant unauthorized access and typically for malicious purposes.

5
New cards

Unintentional Disclosure of Data

Accidental exposure of sensitive information by employees, often due to phishing or carelessness.

6
New cards

Portable Storage Devices

Devices such as USBs that can inadvertently lead to data leaks or virus infections when not properly secured.

7
New cards

Malware

Malicious software that can infect business computers, often introduced through internet downloads or email attachments.

8
New cards

Untrustworthy Sites

Websites that pose a risk of infecting computers with malware or participating in phishing scams.