Take a tour of our end-to-end microlearning platform in under 15 minutes Watch the Demo >

< Library Home

Information Security (InfoSec)

Content by Qstream

Information security, or Infosec, protects sensitive information from unauthorized activities. This includes recording, inspection, destruction, or modification. Infosec’s goal is to ensure the privacy and safety of vital data such as customer financial data, intellectual property, or account details. Learn about best practices for information security with this starter Qstream microlearning course.

Launch To My Team

Category: Compliance Safety and Risk Management

Industry: Technology

Questions: 15

FREE

Content Preview

Information Security (InfoSec)

Navigate through the Qstream questions below to preview. Each challenge is designed following Qstream’s best practices for maximum knowledge reinforcement and engagement. This Qstream is free for clients to use as a starting point.

Click on each title to preview the question in the mobile/desktop widget.

1. Malicious Insiders >
2. Potential Insider Threats >
3. Attackers Access to PPI >
4. Password Habits >
5. Why do attackers compromise accounts? >
6. Know Your Organization >
7. Recognize a potential email threat >
8. Recognize Scams >
9. How does a business email get compromised? >
10. Define Types of Crimes >
11. Things You Can Do >
12. Malicious Attack Examples >
13. Identify Malicious Behavior >
14. Things You Can Do >
15. Identify Types of Crimes >

Follow the interactions on each screen to answer Qstream questions as a Participant.

A malicious insider may attack an organization due to ____________ motivators?

Answer explanation:
Malicious insiders are often motivated to attack an organization for many reasons.

• Political insiders decide to abuse company resources to make a political statement or embarrass someone.
• Revenge insiders feel an individual or company has wronged them in some way. They want to do something that will hurt that company or individual.
• Greed insiders decide to abuse their access to company resources for their own gain. They steal money, intellectual property or assets from the organization.

Desperation insiders commit fraud, theft or sabotage by targeting their vulnerability while experiencing certain life events such as:
• Personal bankruptcy
• Expensive health problem
• Personal tragedy
• Vulnerability to blackmail
• Addiction

Interested in this content and learning more?