Add Papers Marked0
Paper checked off!

Marked works

Viewed0

Viewed works

Shopping Cart0
Paper added to shopping cart!

Shopping Cart

Register Now

internet library
Atlants.lv library
FAQ
1,99 € Add to cart
Add to Wish List
Want cheaper?
ID number:930651
 
Author:
Evaluation:
Published: 06.08.2025.
Language: English
Level: College/University
Literature: 18 units
References: Not used
Extract

Type of threat Causes Solutions
Data exfiltration Outside attackers, careless inside threats Blocking unauthorized communication channels, credential theft and phishing prevention, maintaining user experience, user education
Data breach Weak and stolen credentials (passwords), back doors, application vulnerabilities, malware, social engineering, too many permissions, insider threats, physical attacks, improper configuration, user error Using complex passwords; keeping all software and hardware solutions fully patched and up to date, being wary of accessing web sites which are not what they seem or opening emails where you are suspicious of their origin, rejecting suspicious email offers, putting less permissions, reporting, keeping mistakes and errors to a minimum with professionals
Data loss Human errors, thefts, software corruption, computer viruses, hardware impairment, natural disasters, power failure Backup, firewalls and antivirus, UPS for power failure prevention, DLP strategy, DRP, keeping laptops and other data devices in a dry and dust-free environment, defining access levels to different types of data for different employees, use of RAID storage and journaling file system

Load more similar papers

Atlants

Choose Authorization Method

Email & Password

Email & Password

Wrong e-mail adress or password!
Log In

Forgot your password?

Draugiem.pase
Facebook

Not registered yet?

Register and redeem free papers!

To receive free papers from Atlants.com it is necessary to register. It's quick and will only take a few seconds.

If you have already registered, simply to access the free content.

Cancel Register