Unauthorized access is when someone gains access to a website, program, server, service, or other system using someone else's account or other methods.
Any access to an
information system or network that violates the owner or operator’s
stated security policy is considered unauthorized access.
Unauthorized access is also when legitimate users access a resource that they
do not have permission to use.
The most common reasons
for unauthorized entry are to:
- Steal sensitive data
- Cause damage
- Hold data hostage as part of a
ransomware attack
- Play a prank
The three primary
objectives of preventing unauthorized access are:
- Confidentiality—the protection of
sensitive information from unauthorized access
- Integrity—the protection of
sensitive information from unauthorized modification or destruction
- Availability—the protection of
sensitive information and information systems from unauthorized disruption
The damage from
unauthorized access goes beyond time and money; trust and reputation are also
casualties.
Protection of sensitive
data should be top of mind and a high priority in all organizations. A
defensive, proactive approach to preventing unauthorized access can protect
information and systems from disclosure, modification, destruction, and
disruption.
No comments:
Post a Comment