1a - Understanding how internal threats occur Flashcards
What is end point security?
software set on the device managed server side that monitors/protects the device by enabling wipes and lost device messages
What helps mitigate employee theft?
end point security, cctv, asset audits,
Some examples of employee sabotage.
deliberately faulty products (such as code), destruction of assets, blackmail
List ways to mitigate physical unauthorised access by employees and other users
CRA (controlled room access), badges, cards (employee and guest), key fobs, biometrics, physical keys.
List ways to mitigate digital unauthorised access by employees and other users
TUA (tiered user access), passwords and pw policies, network segmentation, correct user permissions through Active Directory Domain Systems
Define corporate espionage
Corporations trying to obtain information and data they are not supposed to have
Mitigate damage from fire, floods, power loss etc…
Off-site backups, top floor server rooms (floods), halon fire suppression (server rooms)
How to mitigate accidental digital cybersecurity threats?
UAC, firewalls, keyloggers, white/black lists.
How to prevent unsafe hiring practices?
CVs/cover letters as part of vetting process, DBS checks
Mitigate accidental loss or disclosure of data?
private data can only be seen by those who need it, strict policy on moving data (especially out of office)