1/8
Vocabulary flashcards covering key concepts related to insider threats, data breaches, and the importance of employee training based on the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Insider Threat
A security risk originating from an organization's insiders (current/past employees, partners, contractors, etc.) who use legitimate access privileges to compromise the confidentiality, integrity, or availability of data.
Negligent Users
Individuals within an organization who are a top insider threat, often causing security incidents or data breaches due to carelessness or lack of awareness.
Security Breaches
Incidents that are tremendously expensive, requiring significant time, resources, and money to mitigate their devastating effects, often stemming from data compromise or unauthorized access.
Inadvertent Data Breaches
A type of insider threat where sensitive data is unintentionally exposed, identified by 71% of firms as one of the most serious insider threats.
Privileged Access Users
Individuals, such as managers, who have higher levels of access to data and facilities, identified as the most important source of insider threats for 60% of companies.
Intentional Insider Threats
Deliberate security compromises perpetrated by individuals, often seeking personal gain or committing espionage.
Compromised Insider Threats
Occur when a hacker takes advantage of an authorized insider's accidental activities to launch a malware attack or gain unauthorized access to an organization's systems and data.
Accidental Insider Threats
Security breaches that occur when people inadvertently expose sensitive data, including credentials, often in the context of their work, and are the most common cause of cybersecurity breaches.
Employee Training
A vital strategy involving periodic training, test runs, and clearly delineated cybersecurity standards to educate employees on security practices, prevent carelessness, and reduce the risk of breaches.