logo

Possible ways of network data leakage

   

Added on  2023-03-20

5 Pages1091 Words70 Views
 | 
 | 
 | 
Running head: NETWORK DATA LEAKAGE
NETWORK DATA LEAKAGE
Name of the Student
Name of the Organization
Author Note
Possible ways of network data leakage_1

1NETWORK DATA LEAKAGE
Possible ways of network data leakage
Unauthorized use of application- It has been seen very often that by utilising several
applications on the networks of business which are unauthorised can directly place a lot of
sensitive corporate data and information as well as several personal information of the
employees at a high risk. Personal email is considered to be the most commonly utilised
application which is unauthorised and this can be further followed by online banking or
rather an instant messaging (Das et al., 2016). Data leakage can be confirmed in such a case
as there will be huge loss of data as all of these unauthorised applications will be posing a
huge risk for the loss of data by the theft of data by an attacker as they are often seen to be
totally unmonitored and they are not at all using several standards for security.
Misuse of all the corporate computers- There are a number of employees of the business
who are seen to be unknowingly utilising several corporate systems in several ways which
may undermine all the security policies of IT. Some of the examples can be taken as the
alteration of several settings related to security and sharing of a number of work devices as
well as a lot of sensitive information with some other non-employees (Ling et al., 2018).
Even, it has been observed that employees may be bypassing all the settings of IT for
downloading music, engaging in online gambling as well as paying bills. Such behaviours
may be resulting in the leaking out of an intellectual property and reaching a number of
audiences who may be posing huge number of threats to the both the business profit as well
as security.
Misuse of Passwords and several procedures of Login- It is well known that logging out
of any system and utilising a specific password are considered to be some of the simplest
means of the security of computer (Priebe et al., 2014). There may be a high possibility of
Possible ways of network data leakage_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Russian Cyber Attack and Prevention Measures
|13
|2688
|271

Social Media Security Threats and Practices for Secure Social Enterprise Networking System
|4
|942
|274

Information Security Management: Risks, Prevention, and Frameworks
|11
|2362
|381

IT Security: Potential Threats, Organizational Impact, and Security Framework
|6
|1110
|302

Cyber Threats in Social Media Technologies
|12
|3939
|91

Risk Management Assessment 2022
|7
|1151
|21