Video Description
By the end of the video, students will be able to
1. Explain the contribution of employees to the vulnerability of information systems;
2. Differentiate unintentional and deliberate threats to information systems;
3. List down incidents of human errors that cause dangers to information systems;
4. Describe social engineering;
5. Enumerate techniques used for social engineering;
6. Discuss espionage and information extortion;
7. Identify ways of perpetrators to do cybervandalism;
8. Explain losses of an organization when there is theft of equipment;
9. Determine the methods to obtain information for identity theft act of offenders;
10. Define the different categories of malware attacks;
11. Express the various examples of alien software; and
12. Examine the similarity and differences between cyberterrorism and cyberwarfare.
00:00 Introduction
00:10 Categories of Threats to Information Systems
00:24 Unintentional Threats due to Employees
01:30 Human Errors that cause Damages to Information Systems
03:00 Social Engineering
04:14 Deliberate Threats to Information Systems
04:29 Espionage
04:41 Information Extortion
05:34 Cyber vandalism
05:57 Theft of Equipment
06:20 Identity Theft
07:04 Malicious Software Attack
09:03 Alien Software Attack
09:52 Cyberterrorism and Cyberwarfare
10:58 References
11:05 Subscribe and More Videos
Related Videos:
๐น Roles of Information Systems to Organizationโs Competitive Advantage -
https://youtu.be/A2dTPbLomTA๐น Types of Information Systems -
https://youtu.be/nQ4Q3iN7TMM๐น Introduction to Information Systems -
https://youtu.be/g8059-8QDNk๐น Enterprise-Wide Systems - CRM, ERP and SCM (Business Information Systems) -
https://youtu.be/FZbG0EF0rW8References:
๐ Deliberate threats to information system ~ learn information system. Learn Information System. (1970, January 1). Retrieved March 6, 2022, from
http://learn-informationsystem.blogspot.com/2014/12/deliberate-threats-to-information-system.html ๐ teamques10. (2020). Deliberate threats to information systems. Ques10. Retrieved March 6, 2022, from
https://www.ques10.com/p/48137/deliberate-threats-to-information-systems-1/๐ teamques10. (2020). Unintentional threats to information systems. Ques10. Retrieved March 6, 2022, from
https://www.ques10.com/p/48135/unintentional-threats-to-information-systems-1/ Please don't hesitate to ask your questions or write your feedback in the Comments section below. Please support by liking and subscribing to the 5-Minute Lessons by Victor channel. Click the Bell button to be notified when new videos are uploaded. Thank you!
#InformationSystems #InformationSystemsThreats #informationTechnology