Long story short about unintentional threats

--Originally published at Tech and no-tech

So far I have been writing about a lot of issues with the Internet and computer’s security. And there are a lot more of issues. All these issues are called intentional threats, but there also exist unintentional threats? WTF? How come there are unintentional threats? What do you mean?

Human errors, environmental hazards, and computer failures are these so called unintentional threats. Organizations and companies are responsible to establish policies or give solutions to, at least, reduce these errors. Some examples given Rainer and Cegielski on their book Introduction to Information Systems:Supporting and Transforming Business are:

  • Changes to critical data should be monitored with permissions to designated individuals only.
  • User manuals should be developed to control access.
  • Dispose all printouts appropriately.
  • Separate job functions.
  • IT Auditors.
  • Encryption of data.
  • Keep transaction logs to see who has accessed programs and when.

In collaboration with:

References:

Computer Security &Threat Prevention for Individuals & Organizations

Unintentional Threats