 |
Sources of Threats |
A person, a group of people, or even some phenomena unrelated to human activity can serve as an information security threat. Following from this, all threat sources break down into three groups:
- The human factor. This group of threats concerns the actions of people with authorized or unauthorized access to information. Threats in this group can be divided into:
- External, including cyber criminals, hackers, internet scams, unprincipled partners, and criminal structures.
- Internal, including actions of company staff and users of home PCs. Actions taken by this group could be deliberate or accidental.
- The technological factor. This threat group is connected with technical problems - equipment used becoming obsolete and poor-quality software and hardware for processing information. This all leads to equipment failure and often to data loss.
- The natural-disaster factor. This threat group includes any number of events brought on by nature and other events independent of human activity.
All three threat sources must be accounted for when developing a data security protection system. This User Guide only covers external threats involving human activity.
Also see:
How threats spread
Types of threats
Signs of infection
What to do if you show signs of infection
Preventing infection