X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 6 / 158

396 views

0 shares

0 downloads

0 comments

6 / 158

U.S. Department of Health and Human Services

Information systems are not perfect, nor are the people that interact with them or the environments in which they function. As such, systems are vulnerable to misuse, accidents and manipulation.

Threats can come from inside or outside HHS. External forces can disrupt a system, such as a hacker maliciously accessing or corrupting data, or an ordinary storm disrupting power and network access. Internally, an employee can inappropriately change, delete, or use data.

A threat that exploits a vulnerability can allow information to be accessed, manipulated, deleted, or otherwise affected by those without the proper authority. It may also prevent data or a system from being accessed.

Page 2 of 11

Safeguarding the HHS mission Vulnerabilities, Threats and Risks

Document info
Document views396
Page views396
Page last viewedTue Dec 06 00:19:08 UTC 2016
Pages158
Paragraphs2058
Words16945

Comments