• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

System security Describe the potential impact of four different threats - Virus, Trojans,Worms and Phishing.

Extracts from this document...

Introduction

Unit 15: Organisational Systems Security P2-Describe the potential impact of four different threats Virus Virus attacks your computer by attaching itself to another program for example a spreadsheet program. So each time a spreadsheet runs the virus runs as well and has a chance to reproduce and attach to other programs. Viruses allow other people to access your personal information that you give over the internet especially if you are shopping or managing your bank account a various can be used for identity theft. Some viruses can also slow down your computer, delete information and important data or even shut down your computer. ...read more.

Middle

Trojans work by carrying programs in the files you downloaded from the email or a device. These programs allow someone (a hacker) to have a complete access to your computer. Trojan often destroys your computer functionality and that way it allows the hacker to use your computer and you don't know what he is doing. Hackers use Trojans to open backdoors to your computer and that way they have access to all your files on your computer and even they can access your network. Very complexes Trojans can install a dialler and that way they can use your modem which could end up with a big phone bill. ...read more.

Conclusion

They can also install backdoor in the infected computer order to allow it to be used to attack other computers or websites. Phishing Phishing is a way to stealing identity information by using your trust. Usually you receive a fake email from a bank or something similar asking you to fill in a form were you give your details. These details may then be used to steal your money from your bank account or to access your computer or personal information. This can cause you to bankrupt if you give your details to the wrong person. ?? ?? ?? ?? 1 By Camille Metkowski 20631 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    or keying in his/her pin number at an ATM, a card reader may have been installed onto the ATM giving the criminal the relevant card/user details. The criminal may wait for a receipt that the victim may leave behind which may show all of part of the victims bank or card account numbers.

  2. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    * Threats related to e-commerce There are various security threats related to E-commerce. As websites that sell goods online rely solely on the availability and accessibility of an online store, they need to ensure the website is secure and not vulnerable to hackers.

  1. The impact of the availability of electric information on individuals and society

    costs too much; and another group of correspondents said that they just don't have skills for using the internet.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    No one else can read it as only the data receiver has the decoder. Once the data receiver receives the encrypted data, it can be decoded by applying the decoder to the message and then it can be read normally.

  1. Ways of Promoting a Website

    Client side: This type of programming language is downloaded by the web browser and run using the browser. To do so this needs a compiler, therefore a plug in is needed. Server side: Server side means programs or languages that reside on the server and that a user can interact with through the Web server itself.

  2. Smart Card System

    1.5 Transmission Control Protocol (TCP) Initially, TCP was designed to recover from node or line failures where the network propagates routing table changes to all router nodes. Since the update takes some time, TCP is slow to initiate recovery. The TCP algorithms are not tuned to optimally handle packet loss due to traffic congestion.

  1. Flexible Architectures in Communication Security Application

    Page 9 4/22/01 Chapter 1 Introduction Cryptography provides the mechanisms necessary to provide accountability, accuracy and confidentiality in inherently public communication mediums such as the Internet. The widespread adoption of the Internet as a trusted medium for communication and commerce has made cryptography an essential component of modern information systems.

  2. Creating a computer system for Wooten Basset Rugby Club

    identify each record, these are marked by these symbols, < and >. PLAYERS deals with data relating to players such as membership and contact details: <Membership Number> - A unique code used to identify each player. Each Membership code is made up of three numbers and a letter.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work