TubeSort Extras
You're not Alone!

We're here to help you to fight your YouTube Addiction!

Join TubeSort Today!
TubeSort Extension

Take your get rid of youtube challenge to the next level with our free chrome extension.

Get it now!
Browse Categories
Video Description
By the end of the video, students will be able to
1. Explain the contribution of employees to the vulnerability of information systems;
2. Differentiate unintentional and deliberate threats to information systems;
3. List down incidents of human errors that cause dangers to information systems;
4. Describe social engineering;
5. Enumerate techniques used for social engineering;
6. Discuss espionage and information extortion;
7. Identify ways of perpetrators to do cybervandalism;
8. Explain losses of an organization when there is theft of equipment;
9. Determine the methods to obtain information for identity theft act of offenders;
10. Define the different categories of malware attacks;
11. Express the various examples of alien software; and
12. Examine the similarity and differences between cyberterrorism and cyberwarfare.

00:00 Introduction
00:10 Categories of Threats to Information Systems
00:24 Unintentional Threats due to Employees
01:30 Human Errors that cause Damages to Information Systems
03:00 Social Engineering
04:14 Deliberate Threats to Information Systems
04:29 Espionage
04:41 Information Extortion
05:34 Cyber vandalism
05:57 Theft of Equipment
06:20 Identity Theft
07:04 Malicious Software Attack
09:03 Alien Software Attack
09:52 Cyberterrorism and Cyberwarfare
10:58 References
11:05 Subscribe and More Videos

Related Videos:
๐Ÿ“น Roles of Information Systems to Organizationโ€™s Competitive Advantage -
๐Ÿ“น Types of Information Systems -
๐Ÿ“น Introduction to Information Systems -
๐Ÿ“น Enterprise-Wide Systems - CRM, ERP and SCM (Business Information Systems) -

๐Ÿ”— Deliberate threats to information system ~ learn information system. Learn Information System. (1970, January 1). Retrieved March 6, 2022, from
๐Ÿ”— teamques10. (2020). Deliberate threats to information systems. Ques10. Retrieved March 6, 2022, from
๐Ÿ”— teamques10. (2020). Unintentional threats to information systems. Ques10. Retrieved March 6, 2022, from

Please don't hesitate to ask your questions or write your feedback in the Comments section below. Please support by liking and subscribing to the 5-Minute Lessons by Victor channel. Click the Bell button to be notified when new videos are uploaded. Thank you!

#InformationSystems #InformationSystemsThreats #informationTechnology