About This Chapter
Threats to Information Security: Chapter Summary
This chapter provides a comprehensive overview of information security threats. You'll learn to recognize information security threats and take a look at the process and tools professionals use to detect and protect against them. After looking at the different types of information security threats in existence today, you'll discover methods of threat mitigation and management. This chapter also covers other types of security management and threat reduction methods.
The chapter's lessons are taught by expert instructors who present the information in a straightforward, yet engaging manner. You'll see highlighted definitions and examples that illustrate essential information security threat concepts. To make sure you fully understand the chapter's material, you can take the included self-assessment quizzes.
These lessons go over the following topics:
- Definition of information security threats
- Process, tools and examples of threat modeling
- The threat of new entrants
- Insider threat and advanced persistent threat detection and protection
- Analysis and assessment of cyber threats
- The difference between cyber security and information assurance
- Understanding Unified Threat Management
- The Defense Threat Reduction Agency
1. Definition of Threat in Information Security
Information security is a major topic in the news these days. After all, information plays a role in almost everything we do. In this lesson, we'll take a look at what it is, threats, and why they are important.
2. Threat Modeling: Process, Tools & Example
In this lesson, you'll learn about threat modeling to keep your organization safe from hackers. You'll learn about protecting assets from threats, both internal and external, ranging from hackers to natural disasters.
3. The Threat of New Entrants
Even established companies are not safe from the threat of new entrants. But what does that mean? As it turns out, IT companies have less to worry about than firms in other industries. In this lesson, we'll take a look at this peculiar aspect of the IT industry.
4. Insider Threat: Definition & Statistics
While an insider threat may sound like the thing that spy movies are made of, the fact is that they present a very real threat to companies that want to keep their data safe.
5. Insider Threat: Detection & Mitigation
Insider threats are becoming more and more common these days in business. In this lesson, we'll take a look at what they are, how to detect them, and how to mitigate them.
6. Advanced Persistent Threat: Definition & Examples
Want to learn about the sort of computer virus that could keep you up at night? You could have an advanced persistent threat on your computer and not know it until it is too late...
7. Advanced Persistent Threats: Detection & Protection
What is an advanced persistent threat and do you know of the dangers associated with it? Do you know how to prevent them or even detect them? This lesson can help answer those questions.
8. Types of Internet Security Threats
In this lesson, we will define internet security, identify the information being threatened, and discuss the fourteen common internet security threats invading our networks.
9. Cyber Threats: Definition & Types
Explore types of cyber threats and how they affect us. We cannot guarantee that our private data is secure on the Internet. Too many threats exist out there! Let's see what we face on a daily basis when we log on.
10. Cyber Threats: Assessment & Analysis
Cyber threats are a hot topic these days. You just have to look at the evening news to get an example. In this lesson, we'll take a look at cyber threats, what they are, how to assess their impact, and how to determine the root cause.
11. Cyber Threats to US National Security
While images of terrorism may keep us up at night, the real threat to American national security comes from cyber attacks. This lesson details the commonalities of those threats.
12. Cyber Security vs. Information Assurance
Because of the many ways we use information, and their importance to us, protecting it has become a hot topic. In this lesson, we'll take a look at two areas: cyber security and information assurance. We'll focus on what they are, how they are the same, and how they are different.
13. Types of Computer Worms
Malware is a hot topic these days. Home, and business, computers seem to be attacked on a regular basis. In this lesson, we'll take a look at a specific example, worms, and identify the various types. At the end of the lesson, you should have a good understanding of this invasive technology.
14. What is Unified Threat Management (UTM)?
Unified Threat Management is an evolutionary step in firewall and network security technology. It helps to increase network security by making it easier and less costly. We'll learn about what it is and its benefits in this lesson.
15. Unified Threat Management (UTM) Appliance Comparison
Securing information and protecting it against possible problems is of prime importance. In this lesson, we'll take a look at the threat, what it is, unified threat management, and some of the appliances that are used to implement it.
16. What is the Defense Threat Reduction Agency?
Discover how the Defense Threat Reduction Agency came to be and what it does. Can you image doing being stuck in the World Trade towers and seeing an airplane coming towards you? This agency helps to ward off future attacks like that and attacks with weapons of mass destruction.
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.