Identification should include
- intentional theft of data collected through decision support systems (DSS) or the unintentional leakage of data to third parties
- intentional publishing of confidential information from within the industry, such as from a supplier, to damage the company or cause chaos
- foreign access to unmanned aerial systems (UAS) data
- unscrupulous sale of confidential data.
Process/Skill Questions:
- What are brute force attacks?
- What is social engineering?
- How might dumpster diving affect confidentiality if records or data are discarded improperly?
- What is a keylogger?
- How does wiretapping work?
- How might phishing and pharming affect the confidentiality of data in PA?
- What sorts of data should be kept confidential in an agribusiness network?
- How might confidential data be threatened?