Unauthorized Applications and Systems within Organizations | CompTIA Security+ Exam

Unauthorized Applications and Systems within Organizations

Prev Question Next Question

Question

Which of the following refers to applications and systems that are used within an organization without consent or approval?

A.

Shadow IT B.

OSINT C.

Dark web D.

Insider threats.

A.

Explanations

Which of the following refers to applications and systems that are used within an organization without consent or approval?

A.

Shadow IT

B.

OSINT

C.

Dark web

D.

Insider threats.

A.

The correct answer is A. Shadow IT.

Shadow IT refers to the use of any technology or system within an organization that is not authorized or approved by the IT department. This could include the use of cloud services, mobile apps, or other software that employees use to perform their work without seeking approval from the IT department.

The use of Shadow IT can pose significant risks to an organization's security, as IT departments may not be aware of the presence of these systems or the vulnerabilities they may have. This could leave an organization's data and systems exposed to unauthorized access or other cyber threats.

Examples of Shadow IT include the use of personal smartphones or tablets to access work-related data, the use of unauthorized cloud services to store sensitive data, or the installation of unapproved software on company computers.

Therefore, organizations should have policies in place to discourage Shadow IT, encourage employees to seek approval before using new systems, and to ensure that all systems are secure and compliant with industry regulations.