Copyright

Ch 3: Threats to Information Security

About This Chapter

Check out this chapter on information security threats to learn how about preventing, detecting and managing computer threats. These lessons outline the different types of information security threats and threat management agencies.

Threats to Information Security: Chapter Summary

This chapter provides a comprehensive overview of information security threats. You'll learn to recognize information security threats and take a look at the process and tools professionals use to detect and protect against them. After looking at the different types of information security threats in existence today, you'll discover methods of threat mitigation and management. This chapter also covers other types of security management and threat reduction methods.

The chapter's lessons are taught by expert instructors who present the information in a straightforward, yet engaging manner. You'll see highlighted definitions and examples that illustrate essential information security threat concepts. To make sure you fully understand the chapter's material, you can take the included self-assessment quizzes.

These lessons go over the following topics:

  •  Definition of information security threats
  •  Process, tools and examples of threat modeling
  •  The threat of new entrants
  •  Insider threat and advanced persistent threat detection and protection
  • Analysis and assessment of cyber threats
  • The difference between cyber security and information assurance
  • Understanding Unified Threat Management
  • The Defense Threat Reduction Agency

16 Lessons in Chapter 3: Threats to Information Security
Test your knowledge with a 30-question chapter practice test
Definition of Threat in Information Security

1. Definition of Threat in Information Security

Information security is a major topic in the news these days. After all, information plays a role in almost everything we do. In this lesson, we'll take a look at what it is, threats, and why they are important.

Threat Modeling: Process, Tools & Example

2. Threat Modeling: Process, Tools & Example

In this lesson, you'll learn about threat modeling to keep your organization safe from hackers. You'll learn about protecting assets from threats, both internal and external, ranging from hackers to natural disasters.

The Threat of New Entrants

3. The Threat of New Entrants

Even established companies are not safe from the threat of new entrants. But what does that mean? As it turns out, IT companies have less to worry about than firms in other industries. In this lesson, we'll take a look at this peculiar aspect of the IT industry.

Insider Threat: Definition & Statistics

4. Insider Threat: Definition & Statistics

While an insider threat may sound like the thing that spy movies are made of, the fact is that they present a very real threat to companies that want to keep their data safe.

Insider Threat: Detection & Mitigation

5. Insider Threat: Detection & Mitigation

Insider threats are becoming more and more common these days in business. In this lesson, we'll take a look at what they are, how to detect them, and how to mitigate them.

Advanced Persistent Threat: Definition & Examples

6. Advanced Persistent Threat: Definition & Examples

Want to learn about the sort of computer virus that could keep you up at night? You could have an advanced persistent threat on your computer and not know it until it is too late...

Advanced Persistent Threats: Detection & Protection

7. Advanced Persistent Threats: Detection & Protection

What is an advanced persistent threat and do you know of the dangers associated with it? Do you know how to prevent them or even detect them? This lesson can help answer those questions.

Types of Internet Security Threats

8. Types of Internet Security Threats

In this lesson, we will define internet security, identify the information being threatened, and discuss the fourteen common internet security threats invading our networks.

Cyber Threats: Definition & Types

9. Cyber Threats: Definition & Types

Explore types of cyber threats and how they affect us. We cannot guarantee that our private data is secure on the Internet. Too many threats exist out there! Let's see what we face on a daily basis when we log on.

Cyber Threats: Assessment & Analysis

10. Cyber Threats: Assessment & Analysis

Cyber threats are a hot topic these days. You just have to look at the evening news to get an example. In this lesson, we'll take a look at cyber threats, what they are, how to assess their impact, and how to determine the root cause.

Cyber Threats to US National Security

11. Cyber Threats to US National Security

While images of terrorism may keep us up at night, the real threat to American national security comes from cyber attacks. This lesson details the commonalities of those threats.

Cyber Security vs. Information Assurance

12. Cyber Security vs. Information Assurance

Because of the many ways we use information, and their importance to us, protecting it has become a hot topic. In this lesson, we'll take a look at two areas: cyber security and information assurance. We'll focus on what they are, how they are the same, and how they are different.

Types of Computer Worms

13. Types of Computer Worms

Malware is a hot topic these days. Home, and business, computers seem to be attacked on a regular basis. In this lesson, we'll take a look at a specific example, worms, and identify the various types. At the end of the lesson, you should have a good understanding of this invasive technology.

What is Unified Threat Management (UTM)?

14. What is Unified Threat Management (UTM)?

Unified Threat Management is an evolutionary step in firewall and network security technology. It helps to increase network security by making it easier and less costly. We'll learn about what it is and its benefits in this lesson.

Unified Threat Management (UTM) Appliance Comparison

15. Unified Threat Management (UTM) Appliance Comparison

Securing information and protecting it against possible problems is of prime importance. In this lesson, we'll take a look at the threat, what it is, unified threat management, and some of the appliances that are used to implement it.

What is the Defense Threat Reduction Agency?

16. What is the Defense Threat Reduction Agency?

Discover how the Defense Threat Reduction Agency came to be and what it does. Can you image doing being stuck in the World Trade towers and seeing an airplane coming towards you? This agency helps to ward off future attacks like that and attacks with weapons of mass destruction.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support