Managing Data, Ethics, and Security in Modern Information Systems
Posted by Anonymous and classified in Other subjects
Written on in
English with a size of 23.74 KB
Information System Threats and Ethical Foundations
Threats to Information Systems
Threats to Information Systems can be divided into unintentional (non-deliberate) and deliberate threats:
- Unintentional Threats: These occur without malicious intent but still cause serious risks. Examples include human errors (carelessness with laptops, weak passwords, unsafe internet use, mishandling devices) and social engineering (manipulating employees into giving confidential information).
- Deliberate Threats: These are intentional attacks aimed at harming systems. Examples include:
- Espionage and trespass (illegal access)
- Information extortion
- Sabotage and vandalism (defacing websites)
- Theft of equipment or information
- Identity theft
- Software attacks (viruses, worms,