answersLogoWhite

0


Best Answer

The primary threats to the security of information systems include the following:

Natural Disasters: The loss of supporting infrastructure includes power failures(outages, spikes, and brownouts), loss of communications, water outages and leaks, sewer problems, fire, flood, civil unrest, and strikes.

Accidents: This include inexperienced or careless computer users.

Employees and Consultants: This include people within an organization who have access to electronic files. Some of the common examples of computer-related employee sabotage include:

  • Destroying hardware or facilities
  • Entering data incorrectly
  • crashing systems
  • deleting data
  • holding data hostage
  • changing data
Links to Outside Contacts: Electronic information can be at risk when it travels between or among business affiliates as part of doing business.

Outsiders: Hackers and crackers either outsiders or insiders who break into computers without authorization to snoop or cause damage.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the primary threats to information system security?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What best describes informational awareness equals Awareness of potential threats to information systems?

One must be aware and understand the different types of information in a system to understand the threats to the system. An awareness of the threats to the system is based on the information within the system.


Which of the following is NOT one of the primary concerns for Congress regarding information system security?

Reduce lost work time due to security violations


What is a System Threat Assessment Report?

A System Threat Assessment Report is a document that identifies potential threats and vulnerabilities in a system or network. It assesses the likelihood of these threats occurring and their potential impact on the system's security. The report typically includes recommendations for mitigating or addressing these threats to improve the overall security posture of the system.


What are the threats for operating system security?

threat is a unit of code....and a process can have ine or more threats..process is an execution of a programe


What is the definition of security investigation?

A security investigation is a process of examining and assessing potential threats, risks, or incidents that could compromise the security of an organization, individual, or system. It involves gathering evidence, conducting interviews, and analyzing information to identify vulnerabilities and mitigate security breaches.


What is USB Disk Security 6.0.0.126 license key?

The USB disk security is a well known software for protecting your system from USB based malwares/threats. Please go to the related links to find more information.


What does security management enable you to do?

Security management enables you to enjoy protection in your system. You will be notified of any potential threats and firewalls are set up for your system's protection.


Why do you need to maintain security in os level?

Maintaining security at the OS level is important to protect the system from unauthorized access, data breaches, malware attacks, and other security threats. It helps ensure the confidentiality, integrity, and availability of the system and its data, safeguarding against potential vulnerabilities that could compromise the system's operations and users' information.


What are some quality security camera systems?

A good quality security camera system is ADT, they have a great functioning system that is perfect for keeping all kinds of criminals and threats out of the house.


What is the primary type of input and output that is used in an email system?

What is the primary type of input and output that is used in an e-mail system?


Where can someone find information about security system installation?

Information about installing a security system would normally come with the system itself. Other additional information can be picked up from various tutorial videos on YouTube.


Where can a security administrator find information on established security framework?

Information System Audit and Control Association (ISACA)