StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Unintentional Threats to Information Security - Assignment Example

Cite this document
Summary
The paper "Unintentional Threats to Information Security" states that the most important lesson learned from the opening case is to ensure that private and confidential information is not shared on the social network sites like Facebook, Twitter, etc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Unintentional Threats to Information Security
Read Text Preview

Extract of sample "Unintentional Threats to Information Security"

Sharing personal details and daily agenda on their social network can be hugely dangerous for them as cybercriminals can access them through hacking and exploit the same for their vested interests. Opening emails from unknown sources and downloading information from non-trusted sites could seriously threaten information security. Most importantly, as social network sites are most vulnerable to cyber-attacks, users must avoid using them through corporate settings as important corporate information could be leaked and go to unscrupulous hands.

Answer 3
When personal computers are turned into ‘zombie computers’ through malicious software like malware by cyber criminals who have hacked the personal accounts of individuals, the users do not require any actions as they are unaware of the fact. This is a critical issue as users’ not being aware that they are being tracked by cyber criminals, tend to work on computers and the internet as normal, using passwords to log on to their individual/ corporate accounts on corporate sites or sharing personal information on their social network. Consequently, unintentionally they disclose their confidential passwords to attackers and allow them access to their private and confidential information, including corporate information. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“See word Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
See word Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1628530-see-word
(See Word Assignment Example | Topics and Well Written Essays - 250 Words)
See Word Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1628530-see-word.
“See Word Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1628530-see-word.
  • Cited: 0 times

CHECK THESE SAMPLES OF Unintentional Threats to Information Security

Accounting Information Systems

Terrorist attack and natural deserter in New Zealand and other operating countries are considered as macroeconomic threats to the company's information systems.... Accounting information Systems ... Accounting information Systems ... Accounting information systems of the company refers to the efficient use information technology to management of company's operating activities and recoding of daily financials transactions and information....
10 Pages (2500 words) Assignment

Information Security

Title: Need for information security 1.... Moore, Cappelli, Caron, Shaw and Trzeciak (2009) defined insider theft as instances when employees (current or ex-employees) may disclose information for personal motives or as a result of lack of awareness of required information security measures.... Employees might help the outside intruders gain unauthorized access to sensitive data by leaking passwords or loopholes in the security systems.... Effective security measures need to be taken by companies to ensure that sender and receiver cannot deny the transfer and receiving of the messages, respectively....
3 Pages (750 words) Research Paper

Computer Information System Brief

Computer information System Brief Name of Author Author's Affiliation Author Note Author note with more information about affiliation, research grants, conflict of interest and how to contact Computer information System Brief Identify Kudler's key business and accounting information needs.... It is easily understood that Kudler has appropriately invested and organized their computer information method for various business functions....
4 Pages (1000 words) Essay

Increasing Vulnerability of Organizational Information Assets

2005): Spoofing and sniffing Denial of service attacks Identity theft Question 2: Contrast unintentional and deliberate threats to an information resource.... However, there are two major types of threats known as deliberate threats and unintentional threats.... Wireless security Challenges Wireless networks based on radio technology are also vulnerable to security penetration for the reason that radio frequency bands are easy to scan and detect for the attackers....
7 Pages (1750 words) Assignment

Homeland Security and International Relations

uestions are being raised as to whether homeland information security is improving over the years.... his shows the importance of the budget, to both private and public organizations, as an incentive to improve homeland information security in an attempt to increase defense against internet threat attacks.... Identifying information about Americans has been stolen, lost, or improperly disclosed and hence posing threats to those individuals in terms of privacy loss, identity theft, and financial crimes....
4 Pages (1000 words) Essay

Information System Risk Management

unintentional threats-These threats may include unauthorized or even accidental modification of the system.... System security is a very important factor in the implementation of any successful ERP system.... The success of the system does not only depend on the successful development of a nice system but also maintaining it throughout its lifetime and ensuring no threats breach its security.... ecurity Threats-ERP threats are real therefore it is important not only to identify the threats but also to know the vulnerabilities of the system and look for ways of preventing these threats from breaching the security of the ERP system....
8 Pages (2000 words) Case Study

The US Department of Homeland Security

The paper "The US Department of Homeland security" states that the nations' relative approach or method to the cyber battle space and the traditional warfare can be included within DHS's strategic plan.... In recent times, more usage of computers and social media has certainly gauged cyber threats, which can be reduced by the correction of the technical systems as well as improving the structure of cyber security.... The Criticalness of Cyber security and DHSs National Role W/Obama Quote....
9 Pages (2250 words) Research Paper

Factors That Are Contributing to the Increasing Vulnerability of Organizational Information Assets

However, there are two major types of threats known as deliberate threats and unintentional threats.... ireless networks based on radio technology are also vulnerable to security penetration for the reason that radio frequency bands are easy to scan and detect for the attackers.... These hackers can get access to an organization's network and launch a variety of security attacks such as: (Prentice Hall, 2010; KingCounty, 2009; Turban et al.... The paper "Factors That Are Contributing to the Increasing Vulnerability of Organizational information Assets" describes that risk avoidance is the process of recognizing a risk as well as formulating a decision to no longer involving in the activities linked with that risk....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us