1 - Cybersecurity - Internal Threats and External Threats

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/5

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

6 Terms

1
New cards

What is a cyber threat?

any activity or event intended to compromise IT security, unlawfully access data, disrupt operation or damage information

2
New cards

What are the five types of internal threats

the five types of internal threats are:

  1. employee related threats

  2. envrionmental threats

  3. unauthorised access

  4. weak cybersecurity

  5. accidental data loss

3
New cards

What is employee sabotage and theft, give an example and give a prevention.

this occurs when the employees misuse their access to install malware, steal equipment or leak confidential data.

An example of this can be installing malware or theft or equipment or data.

the preventions that can be done could be:

  • implementing strict access controls and user activity monitoring

  • conducting regular security audits to detect insider threats

  • restrict access to sensitive data based on job roles

4
New cards

what is envrionmental threats, give an example and give a prevention.

These are threats caused by physical damage to IT infrastructure due to natural disasters or external attacks.

An example of this can be floods, fires or power loss

The prevention methods that can be used are:

  • utilising backup power sources like generators and uninterruptible power supplies

  • store critical data in off site or cloud backups

  • implement fire and flood prevention measures in server rooms

5
New cards

What is unauthorised access, give an example and a prevention method

Unauthorised access happens when someone gains access to restricted areas or data without permission.

Examples of unauthorised access are physical room access and misuse or elevated permission.

prevention methods that can be used are:

  • implementing multi factor authentication for system access

  • user access logs and security cameras to monitor entry points

  • segregate sensitive data with different permission levels.

6
New cards

what is are weak cybersecurity measures, give an example and a prevention method

weak cybersecurity can expose an organisation or individual to threats due to small amount of protection of data and IT systems.

Examples of weak cybersecurity measures are lack of encryptions, no cybersecurity policies, no files or unmonitored USB or online downloads.