15.1.3 Check Your Understanding - Security Threats
What kind of threat is described when a threat actor alters data records?
data loss or manipulation
What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?
identify theft
What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?
data loss or manipulution
What kind of threat is described when a threat actor prevents legal users from accessing data services?
disruption of service
What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?
identify theft
What kind of threat is described when a threat actor is stealing the user database of a company?
information theft
What kind of threat is described when a threat actor steals scientific research data?
information theft
What kind of threat is described when a threat actor overloads a network to deny other users network access?
disruption of service