8.1.5 Potential threats and vulnerabilities to systems, data and information Flashcards

1
Q

State:

4 human threats

A
  • Human error
  • Malicious employees
  • Disguised criminals
  • Targeted attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fill The Blank:

Human threats may be caused by ………………… intent, …………………… or be accidental.

A

Malicious, Negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill The Blank:

Human error can lead to an accidental loss of ……. - the ……. itself rather than a backup

A

Data, Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State:

2 examples of human error

A

2 of:
* Accidentally deleting a file containing the data, or shredding the final hard copy of a data file
* Saving files and folders to a different location
* Sending emails to the wrong recipients with attachments containing data
* Accidentally making changes in documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State:

2 ways that a company can attempt to minimise the chance of an employee making an error

A

2 of:
* Regular employee training
* High profile reminders to employees
* Ensuring all policies and procedures are read and understood by employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State:

Another name for malicious employees

A

Turncloaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill The Blank:

Malicious ……………. typically user their access details in a malicious and deliberate way to steal ……………………… and ………… for financial or ………………. reasons

A

Employees, Information, Data, Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill The Blank:

An employee may become malicious due to a …………….. engineering attack

A

Social

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill The Blank:

A malicious employee who has exited the company and holds a grudge could be difficult to trace because they usually are familiar with ………………………….. and any ………………………

A

Procedures, Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly