Section 3.25 Shadow IT Flashcards

Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces (3 cards)

1
Q

Shadow IT

Section 3

A

Use of information technology systems, devices, software, applications and services without explicit organisational approval.

IT-related projects that are managed outside of, and without the knowledge of, the IT department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why does Shadow IT exist?

A

An organization’s security posture is actually set too high or is too complex for
business operations to occur without be negatively affected

BYOD: Bring your own devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shadow IT Risks

A

Shadow IT is very dangerous within organisations as unknown/unmanaged devices/cloud networks connected to an organisations network acts as a target for threat actors.

Organisations ideally should procure all the devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly