logo

Threats to Information Security

The purpose of this assessment is to understand threads to the information systems and corresponding security management strategy, be aware of ethical issues correlated to variant information system practices, and apply the knowledge learnt to real life cases.

10 Pages1736 Words398 Views
   

Added on  2022-11-23

About This Document

This report focuses on the major threats to information security and the various ways by which an incident response plan can be developed in order to respond to the immediate threats. It covers human error and mistakes, malicious human activity, natural events and disaster, ethical issues, and real-world case studies.

Threats to Information Security

The purpose of this assessment is to understand threads to the information systems and corresponding security management strategy, be aware of ethical issues correlated to variant information system practices, and apply the knowledge learnt to real life cases.

   Added on 2022-11-23

ShareRelated Documents
Running head: THREATS TO INFORMATION SECURITY
Threats to Information Security
Name of the student:
Name of the university:
Author note:
Threats to Information Security_1
THREATS TO INFORMATION SECURITY1
Table of Contents
Introduction:....................................................................................................................................2
Threats to information Security.......................................................................................................2
Human error and mistakes:..........................................................................................................2
Malicious Human Activity:.........................................................................................................3
Natural Events and Disaster:.......................................................................................................3
Respond to Security Incidents.........................................................................................................4
Disaster-Recovery backup sites:..................................................................................................4
Incident Response Plan:...............................................................................................................4
Ethical Issues...................................................................................................................................5
Major ethical issues:....................................................................................................................5
Real world case and action:.........................................................................................................6
Conclusion:......................................................................................................................................6
Threats to Information Security_2
THREATS TO INFORMATION SECURITY2
Introduction:
In the context of computer security, information threat is referred to as the potential to
cause any harm to the information stored within a computer system (Johnson et al., 2016). These
threats are vulnerable to the potential attacks in computer systems resulting in damage of the
entire computer system (Tosh et al., 2015). As many current issues are gradually emerging in the
context of information security threats, this report is prepared so as to focus on the major threats
to information security and the various ways by which an incident response plan can be
developed in order to respond to the immediate threats.
Threats to information Security
Human error and mistakes:
According several reports that are published, it is evident that most of the cyber threat
that are caused in today’s world are mainly because of the employee negligence and are often
termed as human errors and mistakes (Evans et al., 2016). This type of human error and mistakes
often lead to disruption of the entire business network allowing hackers to get hold of credential
information.
The most common types of human error and mistakes are as follows:
1. Clicking on unknown links: Clicking on unknown link by individuals can lead to attack of
malware in the system while causing disruption of the entire system.
Threats to Information Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybersecurity Threat Name of the Student
|11
|2321
|49

Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

Cyber Defense in Web-Based Attacks | Study
|6
|1596
|13

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

Information Security Awareness Assignment PDF
|7
|1466
|95

Threat and Vulnerability to Facebook
|5
|947
|50