Deliberate Threats to Information Systems
Pot-Pourri
IT Controls
100

This threat involves unauthorized access to organizational data and may include industrial theft of confidential information.

What is espionage or trespass?

100

A large-scale control system used for critical infrastructure like power grids and water plants.

What is a SCADA system?

100

This application control only allows pre-approved software applications to run on a system.

What is Whitelisting?

200

This type of software is secretly installed and includes adware, spyware, and spamware.

What is alien software?

200

This social engineering attack tricks users into revealing confidential information via deceptive emails or websites.

What is phishing?

200

This principle states that users should be granted the privilege for an activity only if there is a justifiable need for them to perform that activity.

What is the principle of least privilege?

300

This form of identity crime includes phishing, stealing mail, or hacking databases to impersonate someone else.

What is Identity Theft?

300

Nation-state actors may use this to destabilize another country's infratructure

What is cyberwarfare?

300

This access control is applied at the application and the network layer.

What is Multi-Factor Authentication?

400
An attacker threatens to steal or steals information from a company or organization. The attacker then demands payment in exchange for not disclosing the information.

What is information extortion?

400

This occurs when a perpetrator watches an employee's computer screen over their shoulder

What is Shoulder Surfing?

400

This access control transforms readable data into an unreadable format to protect it from unauthorized access.

What is Encryption?

500

These deliberate acts can damage a company’s reputation by defacing its website or launching online protests.

What is sabotage or vandalism?

500

Modern cyberattacks often use this combination of malware, phishing, and social engineering.

What is a blended threat?

500

These controls, also known as network security controls, are designed to protect the movement of data across networks.

What are Communications Controls?