Click here to load reader
Upload
karen-lyons
View
55
Download
1
Embed Size (px)
Citation preview
The Benefits Of Data Protection Controls
Karen LyonsIT/200
November 14, 2016Vickie Schubert-Martin
Threats and Vulnerabilities in an Online Environment
• Email Phishing• Malicious Websites• USB Stick Breaches• Software Flaws • Spyware
Email Phishing
Software Flaws and SpywareSoft ware flaws are exploitable flaws left in the software by programmers that hackers use to misuse an application or program.
Spyware is a bug or virus that is installed onto a computer system without the user’s knowledge
Three Types of Security Controls
• Administrative Security• Physical Security• Technical Security
Conclusion
ReferencesWhat is Spyware?. (2016). Retrieved from
http://searchsecurity.techtarget.com/definition/spyware What Are Phishing Scams And How Can I Avoid Them. (2016). Retrieved from
http://searchsecurity.techtarget.com/definition/spyware What Are Malicious Websites. (2016). Retrieved from https://us.norton.com/internetsecurity-malware-what-are-malicious-websites.html 3 Security Controls to Best Protect Your Data. (2015). Retrieved from http://www.iamagazine.com/strategies/read/2015/08/05/3-security-controls-to-best-protect-your-data