1/17
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Internal Threats
Risks to an organization's cybersecurity originating from within the organization.
Employee Sabotage and Theft
Deliberate harmful actions taken by employees, such as tampering with systems or stealing data or physical equipment.
Damage (e.g., fire, flood, power loss)
Harm to an organization's systems or data resulting from events like fires, floods, power outages, or other disasters.
Unauthorized Access (by employees and other users)
Inappropriate entry into secure areas or the use of certain computer functions without proper authorization, carried out by employees or other individuals.
Weak Cybersecurity Measures
Inadequate security practices, including insufficient protection of computer equipment and data.
Unsafe Practices
Actions or behaviors that compromise cybersecurity, such as visiting untrustworthy websites.
Accidental Loss or Disclosure of Data
Unintended data loss or exposure resulting from inadequate training or monitoring of employees.
External Threats
Risks to an organization's cybersecurity originating from outside the organization.
Malicious Software (Malware)
Harmful programs designed to disrupt, damage, or gain unauthorized access to computer systems, including spyware, adware, ransomware, viruses, worms, rootkits, and trojans.
Hacking
Unauthorized access to computer systems, carried out by commercial, government, or individual hackers.
Sabotage
Deliberate damage to systems, which can be instigated by commercial entities, government, terrorism, or individuals.
Social-Engineering Techniques
Deceptive tactics used to obtain secure information from individuals.
Impact of Credible Threat
Consequences that may arise from a genuine cybersecurity threat.
Operational Loss
Disruption in the normal functioning of the organization, affecting processes like manufacturing or service availability.
Financial Loss
Monetary-related losses, including compensation and legal issues.
Reputation Loss
Damage to the company's image, often stemming from a security breach.
Intellectual Property Loss
The loss of valuable information or secrets, such as new product designs or trade secrets.
Changing Threat Landscape
The ever-evolving landscape of cybersecurity threats, which is continually updated by cybersecurity organizations to provide information on the current and evolving threat environment.