1/8
These flashcards cover key concepts related to internal threats to data security, including various types of intentional and unintentional data disclosure.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Intentional Stealing/Leaking of Information
The act of copying, deleting, or leaking sensitive information by individuals with access, often motivated by financial gain, whistleblowing, or feelings of mistreatment.
Whistleblowing
Leaking data to expose illegal or unethical practices within an organization.
Edward Snowden
Former CIA employee who leaked classified information from the NSA due to concerns over surveillance practices.
Overriding Security Controls
Altering security software settings to allow unauthorized access, often for malicious purposes.
Unintentional Disclosure of Data
Inadvertently disclosing sensitive information, such as falling for phishing attacks or losing portable storage devices.
Phishing Email
An email that pretends to be from a trusted source to trick individuals into revealing personal information.
Portable Storage Devices
Devices such as USB drives that can carry data and potentially introduce viruses to a computer system.
Malware
Malicious software that can infect computers, often through downloads or insecure websites.
Untrustworthy Sites
Websites that pose risks to users by potentially infecting devices or being involved in phishing scams.