Cybersecurity Risks

studied byStudied by 3 people
5.0(1)
Get a hint
Hint

Cybersecurity Risks

1 / 40

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

41 Terms

1

Cybersecurity Risks

Potential for unauthorized access, data breaches, and cyberattacks

New cards
2

Data Privacy Risks

Risk of mishandling and unauthorized disclosure of sensitive data

New cards
3

Compliance Risks

Risk of failing to comply with relevant laws and regulations

New cards
4

Business Continuity and Disaster Recovery Risks

Risk of business disruptions due to natural disasters or hardware failures

New cards
5

Vendor and Supply Chain Risks

Risks associated with reliance on third-party vendors and suppliers

New cards
6

IT Project Risks

Risk of IT projects exceeding budget, scope, or time constraints

New cards
7

Technology Adoption Risks

Risks associated with the adoption of new technologies

New cards
8

IT Governance Risks

Risks related to ineffective IT governance structures

New cards
9

Human Error and Insider Threats

Risks associated with unintentional or deliberate actions by employees or insiders

New cards
10

Regulatory and Legal Risks

Risks stemming from non-compliance with IT-related laws and regulations

New cards
11

Ethical Risks

Risks related to unethical IT practices

New cards
12

Phishing attacks

Type of cyberattack used to deceive individuals and obtain sensitive information

New cards
13

Malware infections

Infections caused by malicious software that can harm computer systems

New cards
14

Ransomware

Type of malware that encrypts files and demands a ransom for their release

New cards
15

Data theft

Unauthorized access and theft of sensitive or confidential data

New cards
16

GDPR compliance violations

Violations of the General Data Protection Regulation

New cards
17

Failure to obtain proper consent

Not obtaining appropriate permission for data processing

New cards
18

Non-compliance with HIPAA

Failure to comply with the Health Insurance Portability and Accountability Act

New cards
19

Non-compliance with SOX

Failure to comply with the Sarbanes-Oxley Act

New cards
20

Business disruptions

Disruptions to normal business operations

New cards
21

Lack of BCDR planning

Absence of plans for business continuity and disaster recovery

New cards
22

Inadequate backup procedures

Insufficient processes for backing up data

New cards
23

Prolonged system downtime

Extended period of time when a system is not operational

New cards
24

Vendor lock-in

Dependency on a particular vendor with limited alternatives

New cards
25

Supply chain disruptions

Disruptions in the supply chain that affect IT services and products

New cards
26

Inadequate vendor security measures

Insufficient security measures implemented by vendors

New cards
27

Scope creep

Gradual expansion of project scope beyond the original plan

New cards
28

Inadequate project management

Poor management of project resources and activities

New cards
29

Lack of stakeholder engagement

Insufficient involvement and communication with project stakeholders

New cards
30

Integration challenges

Difficulties in combining new technologies with existing systems

New cards
31

Unexpected costs

Unforeseen expenses associated with technology adoption

New cards
32

Ineffective IT governance structures

Structures that hinder effective decision-making and alignment with business objectives

New cards
33

Inadequate IT governance committees

Committees with insufficient authority and oversight in IT governance

New cards
34

Unclear roles and responsibilities

Lack of clarity in defining roles and responsibilities within IT governance

New cards
35

Accidental data leakage

Unintentional release of sensitive data

New cards
36

Insider trading

Illegal trading of securities based on non-public information

New cards
37

Disgruntled employees

Employees who are dissatisfied and may engage in harmful actions

New cards
38

Violations of data protection laws

Breaches of laws that protect personal data

New cards
39

Failure to retain records as required

Not keeping records for the required period of time

New cards
40

Invasion of privacy

Intrusion into someone's private life without consent

New cards
41

Ethical dilemmas in decision-making

Challenges in making decisions that align with ethical principles

New cards

Explore top notes

note Note
studied byStudied by 2 people
... ago
4.0(1)
note Note
studied byStudied by 4806 people
... ago
4.9(46)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 5 people
... ago
4.0(1)
note Note
studied byStudied by 22 people
... ago
5.0(1)
note Note
studied byStudied by 61 people
... ago
5.0(4)
note Note
studied byStudied by 27 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (94)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (39)
studied byStudied by 12 people
... ago
5.0(1)
flashcards Flashcard (36)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (76)
studied byStudied by 38 people
... ago
5.0(1)
flashcards Flashcard (71)
studied byStudied by 11 people
... ago
5.0(2)
flashcards Flashcard (44)
studied byStudied by 228 people
... ago
5.0(3)
flashcards Flashcard (104)
studied byStudied by 41 people
... ago
5.0(1)
flashcards Flashcard (216)
studied byStudied by 21 people
... ago
5.0(1)
robot