Top 4 information security threats

1. Malware
Malware, short for malicious (or malevolent) software, is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware includes computer viruses, worms, trojan horses, spyware, adware, and other malicious programs.
2. Malicious insiders
An insider is anyone who has approved access, privilege, or knowledge of information systems, information services and missions. A malicious insider is one motivated to adversely impact an organization's mission by taking action that compromises information confidentiality, integrity, and/or availability. Analysis of the demographics and behaviors of malicious insiders conducted by I3P researchers at the MITRE Corporation reveals that they are driven by diverse motivations (e.g., financial enrichment, emotional thrill, desire for revenge, ideological beliefs). This analysis has also allowed us to create an outline of strategies and fundamental measures an organization can take to reduce the risk posed by malicious insiders and to decrease the time from defection to detection.
3. Exploited vulnerabilities
An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised). Such behavior frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.
4.Cyber espionage
Cyber spying or Cyber espionage is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of cracking techniques and malicious software including Trojan horses and spyware. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.
أشكرك على المعلومات المفيده
ردحذف