Section 3.25 Shadow IT Flashcards

Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces

1
Q

Shadow IT

Section 3

A

Use of information technology systems, devices, software, applications and services without explicit organisational approval.

IT-related projects that are managed outside of, and without the knowledge of, the IT department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why does Shadow IT exist?

A

An organization’s security posture is actually set too high or is too complex for
business operations to occur without be negatively affected

BYOD: Bring your own devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shadow IT Risks

A

Shadow IT is very dangerous within organisations as unknown/unmanaged devices/cloud networks connected to an organisations network acts as a target for threat actors.

Organisations ideally should procure all the devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly