Cybersecurity Risks

5.0(1)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

Cybersecurity Risks

Potential for unauthorized access, data breaches, and cyberattacks

2
New cards

Data Privacy Risks

Risk of mishandling and unauthorized disclosure of sensitive data

3
New cards

Compliance Risks

Risk of failing to comply with relevant laws and regulations

4
New cards

Business Continuity and Disaster Recovery Risks

Risk of business disruptions due to natural disasters or hardware failures

5
New cards

Vendor and Supply Chain Risks

Risks associated with reliance on third-party vendors and suppliers

6
New cards

IT Project Risks

Risk of IT projects exceeding budget, scope, or time constraints

7
New cards

Technology Adoption Risks

Risks associated with the adoption of new technologies

8
New cards

IT Governance Risks

Risks related to ineffective IT governance structures

9
New cards

Human Error and Insider Threats

Risks associated with unintentional or deliberate actions by employees or insiders

10
New cards

Regulatory and Legal Risks

Risks stemming from non-compliance with IT-related laws and regulations

11
New cards

Ethical Risks

Risks related to unethical IT practices

12
New cards

Phishing attacks

Type of cyberattack used to deceive individuals and obtain sensitive information

13
New cards

Malware infections

Infections caused by malicious software that can harm computer systems

14
New cards

Ransomware

Type of malware that encrypts files and demands a ransom for their release

15
New cards

Data theft

Unauthorized access and theft of sensitive or confidential data

16
New cards

GDPR compliance violations

Violations of the General Data Protection Regulation

17
New cards

Failure to obtain proper consent

Not obtaining appropriate permission for data processing

18
New cards

Non-compliance with HIPAA

Failure to comply with the Health Insurance Portability and Accountability Act

19
New cards

Non-compliance with SOX

Failure to comply with the Sarbanes-Oxley Act

20
New cards

Business disruptions

Disruptions to normal business operations

21
New cards

Lack of BCDR planning

Absence of plans for business continuity and disaster recovery

22
New cards

Inadequate backup procedures

Insufficient processes for backing up data

23
New cards

Prolonged system downtime

Extended period of time when a system is not operational

24
New cards

Vendor lock-in

Dependency on a particular vendor with limited alternatives

25
New cards

Supply chain disruptions

Disruptions in the supply chain that affect IT services and products

26
New cards

Inadequate vendor security measures

Insufficient security measures implemented by vendors

27
New cards

Scope creep

Gradual expansion of project scope beyond the original plan

28
New cards

Inadequate project management

Poor management of project resources and activities

29
New cards

Lack of stakeholder engagement

Insufficient involvement and communication with project stakeholders

30
New cards

Integration challenges

Difficulties in combining new technologies with existing systems

31
New cards

Unexpected costs

Unforeseen expenses associated with technology adoption

32
New cards

Ineffective IT governance structures

Structures that hinder effective decision-making and alignment with business objectives

33
New cards

Inadequate IT governance committees

Committees with insufficient authority and oversight in IT governance

34
New cards

Unclear roles and responsibilities

Lack of clarity in defining roles and responsibilities within IT governance

35
New cards

Accidental data leakage

Unintentional release of sensitive data

36
New cards

Insider trading

Illegal trading of securities based on non-public information

37
New cards

Disgruntled employees

Employees who are dissatisfied and may engage in harmful actions

38
New cards

Violations of data protection laws

Breaches of laws that protect personal data

39
New cards

Failure to retain records as required

Not keeping records for the required period of time

40
New cards

Invasion of privacy

Intrusion into someone's private life without consent

41
New cards

Ethical dilemmas in decision-making

Challenges in making decisions that align with ethical principles