preview

A Brief Note On Non Technical Cyber Security Threats And Information System

Good Essays

B. NON TECHNICAL CYBER SECURITY THREATS TO INFORMATION SYSTEM
• Insider - An insider is known as someone with legitimate access to the network. Because information and data accessed by insiders can be easily copied, stolen, deleted, misfiled, or updated, insider threats can be some of the most damaging, harmful regardless of whether they occur due to user carelessness or do the malicious activity.
• Physical Security- Physical Security is significant to preventing unauthorized access to sensitive data, information as well as protecting an organization’s personnel and their resources. An effective and impacted physical security system is an integral part of a comprehensive security system. Physical safety measures consist …show more content…

Socially engineered attacks are the means for some hackers to access codes and gain password, IP addresses, server and routers names, and other information that can be exploited to break into a network security and privacy.

• Insufficient Backup and Recovery- Lack of robust data and recovery solution puts an organization’s data at risk and undermines the effectiveness of its IT operations. Data and system recovery capabilities allow an organization to reduce the risk of damage associated with a data breach. It is essential to conduct routine backups of critical data and store backup media in a safe and secure manner.
• Poor Passwords- Implementing a policy on strong user passwords is critical to data protection. It is especially important for users with access to the most sensitive information. Modern password-cracking programs can easily break weak passwords, such as those containing common words or word groups found in a dictionary. For this reason, user-selected passwords are generally considered to be weaker than randomly-generated passwords. User-generated Page 5 of 8 passwords often follows a predictable pattern or association to something in the user’s life (city, family, or pet names for example) and are therefore more vulnerable to password-cracking programs. While randomly-generated passwords may be harder to remember, they are relatively more secure.

Get Access