1/7
Flashcards covering vocabulary related to internal threats to information security.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Intentional Stealing/Leaking of Information
The act by individuals with access to sensitive data to copy, delete, or leak it for reasons such as financial gain, whistleblowing, or personal grievances.
Whistleblowing
Leaking information to expose illegal or unethical practices.
Edward Snowden
A former CIA employee who leaked classified information from the NSA due to concerns about mass surveillance.
Users Overriding Security Controls
Actions taken by authorized users to alter security settings, often to grant unauthorized access and typically for malicious purposes.
Unintentional Disclosure of Data
Accidental exposure of sensitive information by employees, often due to phishing or carelessness.
Portable Storage Devices
Devices such as USBs that can inadvertently lead to data leaks or virus infections when not properly secured.
Malware
Malicious software that can infect business computers, often introduced through internet downloads or email attachments.
Untrustworthy Sites
Websites that pose a risk of infecting computers with malware or participating in phishing scams.