• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

System security Describe the potential impact of four different threats - Virus, Trojans,Worms and Phishing.

Extracts from this document...


Unit 15: Organisational Systems Security P2-Describe the potential impact of four different threats Virus Virus attacks your computer by attaching itself to another program for example a spreadsheet program. So each time a spreadsheet runs the virus runs as well and has a chance to reproduce and attach to other programs. Viruses allow other people to access your personal information that you give over the internet especially if you are shopping or managing your bank account a various can be used for identity theft. Some viruses can also slow down your computer, delete information and important data or even shut down your computer. ...read more.


Trojans work by carrying programs in the files you downloaded from the email or a device. These programs allow someone (a hacker) to have a complete access to your computer. Trojan often destroys your computer functionality and that way it allows the hacker to use your computer and you don't know what he is doing. Hackers use Trojans to open backdoors to your computer and that way they have access to all your files on your computer and even they can access your network. Very complexes Trojans can install a dialler and that way they can use your modem which could end up with a big phone bill. ...read more.


They can also install backdoor in the infected computer order to allow it to be used to attack other computers or websites. Phishing Phishing is a way to stealing identity information by using your trust. Usually you receive a fake email from a bank or something similar asking you to fill in a form were you give your details. These details may then be used to steal your money from your bank account or to access your computer or personal information. This can cause you to bankrupt if you give your details to the wrong person. ?? ?? ?? ?? 1 By Camille Metkowski 20631 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    * Spoof Letters, Telephone Calls, Faxes and Callers at your Home. These types of methods for obtaining the victims personal information are diverse in nature but will typically inform the victim that he/she has come into money via one of a number of sources, e.g.

  2. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    For example; Denial of Service attacks could prevent potential customers from purchasing goods and thus forth lose sales. Another example is website defacement which would also repel potential customers from buying online. There is also a threat of hackers implementing the 'man in the middle' technique on behalf of particular

  1. The impact of the availability of electric information on individuals and society

    it have reduced the need for business travel, which means that less money is being spent on travelling therefore expenditures are smaller. Effects on people who do not have access or don't want to have access to the internet Some people can't have access to the internet while some just don't want to have it.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    This means if a virus distorts the data, the computer crashes, the disk that holds the data is lost, stolen or destroyed or if you even accidentally delete the document then there is always a back up at hand. To do this you simply save any important documents on a

  1. Introduction to Viruses

    The sites were eventually able to counter the attacks by installing filters. But even officials at the companies acknowledged that those were only stopgap measures and might not deflect future attacks. If this is the case and large corporations can't protect themselves, how can the average user protect themselves?

  2. Smart Card System

    In addition, there are abstract interfaces for key management, certificate management and access control. Specific APIs to support X.509 v3 certificates and other certificate formats, and richer functionality in the area of access control, will follow in subsequent JDK releases.

  1. Creating a computer system for Wooten Basset Rugby Club

    The Players-Fixtures data store will link Players and Fixtures together. It will store data relating to what a particular player does in each game. Each record will be identified by using a player's membership code and the corresponding fixture code, these two foreign keys will create a composite key.

  2. You need to discuss the advantages and disadvantages of someone in your

    To add a new customer, validation of data will automatically occur in the following fields: postcode will be field length check; sex will be "1" or "2"; date of birth will be data type check. Also when adding a new customer I am planning on-screen verification before the information is saved.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work