• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Business & IT Department BTEC. Organisational System Security - Describe the various types of threats to organisations, systems and data

Extracts from this document...

Introduction

Assignment 1 Describe the various types of threats to organisations, systems and data - P1 * Unauthorised access - This category covers internal and external threats. Internal threats are things such as: Magic Disks - A recovery or backup disk that has been modded to include viruses or key loggers. Man in the middle attacks - People extracting sensitive and confidential information whilst posing to be a customer, or a legitimate company. Implanting Key loggers - Applications designed to record key strokes and send them back to the hacker. External threats are this such as; Viruses - Rouge applications designed to damage or make a system vunerable Trojans - Applications designed to infiltrate a system often by posing to be a harmless file or embedded into another file. Piggybacking - A term given to people who use someone else's internet connection without authorisation. This is often undertaken by logging onto an unsecured network without permission. Phishing - Attempting to fool a user into believing you are a legitimate service attempting to gain sensitive information. * Damage to or destruction of systems or information Damage to systems can occur when devices fail such as hard drives failing or natural disasters occurring in the workplace that could result in damaged or destroyed places. Such as: 1. ...read more.

Middle

Counterfeit goods are becoming increasingly popular as the ease of ripping DVD's, Music and Software makes it easier to access. Counterfeit goods may cause loss of business for companies. The loss of business then results in businesses having to raise prices to make up for loss of profit. * Organisational impact Security threats can cause loss or alteration of essential documents that the an organisation may need to function correctly. Loss of business followed by loss of income can also occur, this ultimately could result in bad reputation from potential customers. Systems going down could result in companies being unable to contact suppliers and customers. Circumstances of 4 security related threats on organisations - p2 Phishing -This is the process of gaining information from someone by pretending to be a legitimate worker for a company and retrieving information for legitimate reasons. Phishing could result in customer details being leaked, distributed, and exploited. This could badly reflect on the company and lose the company business and income. Denial of Service - Denial of Service is a process that involves a hacker overloading a server which results in the server being forced to shut down. This could result in loss of potential customers and thus profit. Piggybacking - Piggybacking is the process of using a company internet connection without having authorisation to use it. ...read more.

Conclusion

And also as a countermeasure to attempt to catch anyone with malicious intent. Countermeasures Vermason could implement to protect network security - p4: Backups - Backups are an essential countermeasure in offices. If there was an electrical fire or other natural disaster that could result in loss of data, this would insure that all essential data such as databases the company requires to undertake work related tasks are still there aswell as contact, supplier and customer information so that they do not need to be re-acquired. Passwords - Passworded systems can be implemented to secure individual workers within the company, it firstly provides an element of data security for each individual (eg; sensitive information that may be kept on a user account) and also holds each user responsible for there own actions on the computer under there own user account. More importantly; passwords ensure that only legitimate employees have access to important company files and other such potentially confidential information. Firewalls - A firewall would prevent unauthorised access from outside the network. It does this by scanning data packets coming onto the computer and ensuring that they are safe, it also is responsible for actively preventing virus's such as Trojans being downloaded from the internet and onto the network computers. Installing a firewall would prevent hackers from accessing the network and stealing data or causing damage. ?? ?? ?? ?? Chris Leversha - Page | 1 - 07/10/2010 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

3 star(s)

Quite a good introduction to this interesting topic but a few more technical details would have improved it

Marked by teacher Ivor Borkin 21/02/2012

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    * Data may only be used for the specific purposes for which it was collected. * Data must not be disclosed to other parties without the consent of the individual whom it is about, unless there is legislation or other overriding legitimate reason to share the information (for example, the prevention or detection of crime).

  2. Future needs of Computer

    * Role of Artificial intelligence in future: We need Robots to replace factory workers. We need them to act as surgeons, pilots, astronauts, etc. According to Crevier, A computer scientist, robots will take over clerical workers, the middle managers and on up.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    secondary storage device such as a floppy disk or a hard disk. Notes: A buffer is a small amount of fast memory outside the processor that allows the processor to get on with other work instead of being held up by the secondary device.

  2. Computer systems assignment 1

    The leading sound card producer is Creative. * Modem- modem is required in a computer if you want to connect to internet. It converts the digital binary signals to analogue signals so it can be transferred in a network. There are internal modems which are connected to motherboard inside the

  1. Activity Based Costing system

    possible, and these products can be produced in large volumes, using very simple machinery and a lot of hard work. Because these products can cause similar amount of production overheads, we just use the total productions overheads divided by a total base like direct material or labor hours, we can simply get equal amount of product overheads for every product.

  2. The impact of the availability of electric information on individuals and society

    But anyway, the availability of electronic information has improved my life a lot and I can't imagine my life without it any more. The increased availability of electronic information has changed my school life as well. ICT subject is available for students like me only because of increased availability of

  1. System Analysis The aim of the Jewellery store system is to make the work ...

    by conducting interviews, 5) by questionnaires 6) on site observations Gathered data must be then analyzed and documented in the form of data flow diagrams (DFD), data dictionary (list of terms and their definitions), logical data structures and miniature specifications. System analysis also includes sub-division of the entire system into smaller sub-processes.

  2. Evaluate the design and operation of Frito-Lay's logistic network.

    It is an older system used to determine routes with an antiquated algorithm for determining routes. There are opportunities to improve routes (and therefore reduce cost) by replacing VSP. It also appears that the best routes would be needed to insure that the backhaul proposal is cost effective.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work