Professional Documents
Culture Documents
Security-Word-Doc
Security-Word-Doc
1|Page
UNDERSTANDING AND MITIGATING DIGITAL
THREATS
WHAT IS SECURITY
Digital security, also known as cybersecurity, refers to the practice of protecting digital information, systems, and
networks from unauthorized access, use, disclosure, disruption, modification, or destruction. It encompasses various
technologies, processes, and practices designed to safeguard digital assets, including data, hardware, software, and
networks, against a wide range of threats and vulnerabilities.
THREATS TO USERS:
IDENTITY THEFT:
Unauthorized acquisition and use of an individual's personal information, such as social security
numbers or banking details, for fraudulent purposes.
LOSS OF PRIVACY:
Invasion of an individual's privacy through unauthorized access to personal data or surveillance.
ONLINE THEFT:
Unauthorized acquisition of digital assets or financial resources through cyber means, such as
hacking bank accounts or stealing digital identities.
ONLINE FRAUD:
Deceptive practices conducted online to deceive individuals into giving up personal information or
financial resources.
THREATS TO HARDWARE:
2|Page
POWER RELATED THREATS:
Risks associated with power fluctuations, outages, or surges that can damage hardware
components or lead to data loss.
HARDWARE LOSS:
Physical theft or misplacement of hardware devices, such as laptops or smartphones,
compromising the security of stored data.
HARDWARE DAMAGE:
Physical damage to hardware components due to accidents, mishandling, or environmental factors.
SYSTEM FAILURE:
Unexpected failures or malfunctions of hardware systems, leading to disruption of services or loss
of data.
NATURAL DISASTERS:
Events such as floods, fires, earthquakes, or storms that can cause physical damage to hardware
infrastructure and result in data loss or system downtime.
THREATS TO DATA:
a) MALWARE :
3|Page
Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems
or data, including viruses, worms, trojans, and ransomware.
Software programs specifically designed to infect and harm computer systems, often spread
through infected files, emails, or downloads.
c) CYBERCRIME :
Criminal activities conducted online, including theft, fraud, extortion, and unauthorized access to
sensitive data or financial resources.
d) CYBER TERRORISM:
Use of cyber means to create fear, disrupt services, or cause harm to individuals, organizations, or
governments for ideological or political purposes.
COUNTERMEASURES:
4|Page