1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is a cyber threat?
any activity or event intended to compromise IT security, unlawfully access data, disrupt operation or damage information
What are the five types of internal threats
the five types of internal threats are:
employee related threats
envrionmental threats
unauthorised access
weak cybersecurity
accidental data loss
What is employee sabotage and theft, give an example and give a prevention.
this occurs when the employees misuse their access to install malware, steal equipment or leak confidential data.
An example of this can be installing malware or theft or equipment or data.
the preventions that can be done could be:
implementing strict access controls and user activity monitoring
conducting regular security audits to detect insider threats
restrict access to sensitive data based on job roles
what is envrionmental threats, give an example and give a prevention.
These are threats caused by physical damage to IT infrastructure due to natural disasters or external attacks.
An example of this can be floods, fires or power loss
The prevention methods that can be used are:
utilising backup power sources like generators and uninterruptible power supplies
store critical data in off site or cloud backups
implement fire and flood prevention measures in server rooms
What is unauthorised access, give an example and a prevention method
Unauthorised access happens when someone gains access to restricted areas or data without permission.
Examples of unauthorised access are physical room access and misuse or elevated permission.
prevention methods that can be used are:
implementing multi factor authentication for system access
user access logs and security cameras to monitor entry points
segregate sensitive data with different permission levels.
what is are weak cybersecurity measures, give an example and a prevention method
weak cybersecurity can expose an organisation or individual to threats due to small amount of protection of data and IT systems.
Examples of weak cybersecurity measures are lack of encryptions, no cybersecurity policies, no files or unmonitored USB or online downloads.