====== Methods of implementing threats to information security ====== The main methods of implementing threats to information security include: ** External threats:** - System hacking; - Phishing attack; - Server attack; - Denial of service (DDoS). **Internal threats:** - Unauthorized access to data; - Actions of malicious employees; - Unintentional employee errors; - Introduction of malware. Translated with www.DeepL.com/Translator (free version)