System security Describe the potential impact of four different threats - Virus, Trojans,Worms and Phishing.

Authors Avatar

Unit 15: Organisational Systems Security

P2-Describe the potential impact of four different threats

Virus

Virus attacks your computer by attaching itself to another program for example a spreadsheet program. So each time a spreadsheet runs the virus runs as well and has a chance to reproduce and attach to other programs.

Viruses allow other people to access your personal information that you give over the internet especially if you are shopping or managing your bank account a various can be used for identity theft. Some viruses can also slow down your computer, delete information and important data or even shut down your computer.

Join now!

Trojans

The Trojan has to get to your computer and it’s usually done by an infected email or downloads and sometimes by CD or DVD. Often emails look like a typical joke or news email that a friend would send. But when you click on the link in the newsletter, it will take you to an infected website and install a Trojan once you viewed the webpage.

Trojans work by carrying programs in the files you downloaded from the email or a device. These programs allow someone (a hacker) to have a complete access to your computer. Trojan often ...

This is a preview of the whole essay