• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Business & IT Department BTEC. Organisational System Security - Describe the various types of threats to organisations, systems and data

Extracts from this document...


Assignment 1 Describe the various types of threats to organisations, systems and data - P1 * Unauthorised access - This category covers internal and external threats. Internal threats are things such as: Magic Disks - A recovery or backup disk that has been modded to include viruses or key loggers. Man in the middle attacks - People extracting sensitive and confidential information whilst posing to be a customer, or a legitimate company. Implanting Key loggers - Applications designed to record key strokes and send them back to the hacker. External threats are this such as; Viruses - Rouge applications designed to damage or make a system vunerable Trojans - Applications designed to infiltrate a system often by posing to be a harmless file or embedded into another file. Piggybacking - A term given to people who use someone else's internet connection without authorisation. This is often undertaken by logging onto an unsecured network without permission. Phishing - Attempting to fool a user into believing you are a legitimate service attempting to gain sensitive information. * Damage to or destruction of systems or information Damage to systems can occur when devices fail such as hard drives failing or natural disasters occurring in the workplace that could result in damaged or destroyed places. Such as: 1. ...read more.


Counterfeit goods are becoming increasingly popular as the ease of ripping DVD's, Music and Software makes it easier to access. Counterfeit goods may cause loss of business for companies. The loss of business then results in businesses having to raise prices to make up for loss of profit. * Organisational impact Security threats can cause loss or alteration of essential documents that the an organisation may need to function correctly. Loss of business followed by loss of income can also occur, this ultimately could result in bad reputation from potential customers. Systems going down could result in companies being unable to contact suppliers and customers. Circumstances of 4 security related threats on organisations - p2 Phishing -This is the process of gaining information from someone by pretending to be a legitimate worker for a company and retrieving information for legitimate reasons. Phishing could result in customer details being leaked, distributed, and exploited. This could badly reflect on the company and lose the company business and income. Denial of Service - Denial of Service is a process that involves a hacker overloading a server which results in the server being forced to shut down. This could result in loss of potential customers and thus profit. Piggybacking - Piggybacking is the process of using a company internet connection without having authorisation to use it. ...read more.


And also as a countermeasure to attempt to catch anyone with malicious intent. Countermeasures Vermason could implement to protect network security - p4: Backups - Backups are an essential countermeasure in offices. If there was an electrical fire or other natural disaster that could result in loss of data, this would insure that all essential data such as databases the company requires to undertake work related tasks are still there aswell as contact, supplier and customer information so that they do not need to be re-acquired. Passwords - Passworded systems can be implemented to secure individual workers within the company, it firstly provides an element of data security for each individual (eg; sensitive information that may be kept on a user account) and also holds each user responsible for there own actions on the computer under there own user account. More importantly; passwords ensure that only legitimate employees have access to important company files and other such potentially confidential information. Firewalls - A firewall would prevent unauthorised access from outside the network. It does this by scanning data packets coming onto the computer and ensuring that they are safe, it also is responsible for actively preventing virus's such as Trojans being downloaded from the internet and onto the network computers. Installing a firewall would prevent hackers from accessing the network and stealing data or causing damage. ?? ?? ?? ?? Chris Leversha - Page | 1 - 07/10/2010 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

3 star(s)

Quite a good introduction to this interesting topic but a few more technical details would have improved it

Marked by teacher Ivor Borkin 21/02/2012

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    It is an offence for Other Parties to obtain this personal data without authorisation. * Individuals have a right of access to the information held about them, subject to certain exceptions (for example, information held for the prevention or detection of crime).

  2. Activity Based Costing system

    possible, and these products can be produced in large volumes, using very simple machinery and a lot of hard work. Because these products can cause similar amount of production overheads, we just use the total productions overheads divided by a total base like direct material or labor hours, we can simply get equal amount of product overheads for every product.

  1. Computer systems assignment 1

    The leading sound card producer is Creative. * Modem- modem is required in a computer if you want to connect to internet. It converts the digital binary signals to analogue signals so it can be transferred in a network. There are internal modems which are connected to motherboard inside the

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    secondary storage device such as a floppy disk or a hard disk. Notes: A buffer is a small amount of fast memory outside the processor that allows the processor to get on with other work instead of being held up by the secondary device.

  1. Evaluate the design and operation of Frito-Lay's logistic network.

    It is an older system used to determine routes with an antiquated algorithm for determining routes. There are opportunities to improve routes (and therefore reduce cost) by replacing VSP. It also appears that the best routes would be needed to insure that the backhaul proposal is cost effective.

  2. The impact of the availability of electric information on individuals and society

    Another example of how increased availability of electronic information has changed my life is the way I find the information I need. Not so long ago I was searching for information I need in paper-based sources e.g. books; newspapers and magazines.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    Data Protection Act Riverside also abides by the Data protection Act (1998 as amended). The Act is in place to protect the data held by the data user (in this case the data held will be addresses, bank details, fitness levels of customers and the data user will be Riverside).

  2. BTEC National in IT Organisational systems security - Policies and guidelines for IT security ...

    The procedures must be regularly reviewed and updated, these updates need to reflect what was outlined to be improved in the review and needs to be in date with current knowledge on security threats. However, the update may have a negative impact on the existing systems and so should be tested before applied to the entire organisations systems.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work