You are on page 1of 8

UNDERSTANDING SECURITY

THREATS AND RISKS


ACHA, MIKE JIM C.
BALAGAPO, ADAM VINCENT A.
CHICANO, JOHN RENZO
WHAT ARE SECURITY THREATS?

• A security threat is any action or event that could potentially


harm an individual, business or organization.
• Threat can be intentional or unintentional, and they can target a
variety of assets, including data, systems, and people

Security threats can come from a variety of sources, including:

 Cybercriminals
- individuals or groups who use malicious software, phishing attacks, and
other techniques to steel data, disrupt operations, or extort money.
 Hackers
- an individuals who gain unauthorized access to computer systems or

networks, often with malicious intent.

 Insider Threats
- employees, contractors, or other authorized users who misuse their
access
privileges to harm an organization.

 Natural Disasters
- events such as flood, earthquakes, and fires can damage physical
infrastructure and disrupt operation.

 Technical Failures
- hardware or software failures can expose vulnerabilities and lead to
data
breaches.
TYPES OF SECURITY THREATS

 Malware
- malicious software that can damage or steal data, disrupt
operations, or spy on users.

 Phishing
- deceptive emails or messages designed to trick users into
revealing sensitive information.

 Ransomware
- malware that encrypts data and demands a ransom payment to
decrypt it.
 Denial of Service (DoS) Attacks
- attempts to overload a system with traffic, making it
unavailable to legitimate user/s.

 Data Breaches
- unauthorized access to or disclosure of sensitive
information.

 Social Engineering
- techniques used to manipulate people into giving up
sensitive information or taking actions that could harm
themselves or their organizations.
IMPACT OF SECURITY THREATS

 Security threats can have a significant impact on individuals,


businesses, and organizations.

 Potential consequences include:


• Financial Losses - Data breaches,
ransomware attacks, and other security incidents can cost
organizations millions of dollars.
• Reputational Damage - A security breach can damage
an organization’s reputation and erode customer trust.
• Operational Disruptions - Security incidents can disrupt
operations and lead to lost productivity.
• Legal and Regulatory Compliance Issues - Security
breaches can violate data privacy laws and regulations, leading
to fines and penalties.
MANAGING SECURITY RISKS

 Security risks are the potential for a security threat to exploit a vulnerability
and cause harm.

 Risk management is a process of identifying, assessing, and mitigating


security risks.

 Key steps in risk management include:


• Identifying Assets
- What needs to be protected?
• Assessing Vulnerabilities
- What are the weaknesses that could be exploited by
threats?
• Calculating Risk
- What is the likelihood and impact of each
threat?

• Implementing Controls
- What can be done to mitigate the risks?

CONCLUSION:

Security threats are constant challenge, but they can be managed by


understanding the risks and taking steps to invest in preparedness and
response plans. Having a clear plan for how to identify, respond to, and
recover from security incidents can minimize damage and restore normalcy
quickly. Regularly rehearse your response plan and update it as needed to
ensure its effectiveness.

You might also like