MCS 2020 Lecture Notes - Lecture 12: Email Spoofing, Teijin, Adware
Document Summary
By the end of this unit, you should be able to: Recognize the sources and types of security and identity threats. Explain the elements of a security program. Describe how technical safeguards, data safeguards and human safeguards protect against security threats. Enumerate what is necessary for disaster preparedness. Describe how organizations should respond to security incidents. Sources and types of security and identity threats. Unauthorized data disclosure can occur by human error when someone inadvertently releases data in violation of policy. An example at a university would be a new department administrator who posts student names, numbers, and grades in a public place, when the releasing of names and grades violates provincial law (pipeda) Popularity and efficacy of search engines have created another source of inadvertent disclosure. Proprietary and personal data can also be released maliciously. Pretexting occurs when someone deceives by pretending to be someone else.