Professional Documents
Culture Documents
Rishi Jain
October 25 2023
Confidentiality
Keeping data private and accessible only to authorized users.
Integrity
Ensuring data is accurate and unaltered.
Availability
Data should be accessible when needed.
Malware
Malicious software designed to harm or infiltrate computer systems,
such as viruses, worms, and ransomware.
Phishing
Deceptive emails or websites trick users into revealing personal
information, often for identity theft or fraud.
Data breaches
Unauthorized access or release of sensitive data, compromising privacy
and security.
Social engineering
Manipulating individuals to reveal confidential information, often
through psychological manipulation or impersonation.
Insider threats
Internal individuals misuse their access for malicious purposes,
jeopardizing an organization’s security and data.
fig(1)-Firewall
fig(1)- www.expressvpn.com
Definitions- www.techtarget.com
Additional Resourses- www.microsoft.com