• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

System security Describe the potential impact of four different threats - Virus, Trojans,Worms and Phishing.

Extracts from this document...

Introduction

Unit 15: Organisational Systems Security P2-Describe the potential impact of four different threats Virus Virus attacks your computer by attaching itself to another program for example a spreadsheet program. So each time a spreadsheet runs the virus runs as well and has a chance to reproduce and attach to other programs. Viruses allow other people to access your personal information that you give over the internet especially if you are shopping or managing your bank account a various can be used for identity theft. Some viruses can also slow down your computer, delete information and important data or even shut down your computer. ...read more.

Middle

Trojans work by carrying programs in the files you downloaded from the email or a device. These programs allow someone (a hacker) to have a complete access to your computer. Trojan often destroys your computer functionality and that way it allows the hacker to use your computer and you don't know what he is doing. Hackers use Trojans to open backdoors to your computer and that way they have access to all your files on your computer and even they can access your network. Very complexes Trojans can install a dialler and that way they can use your modem which could end up with a big phone bill. ...read more.

Conclusion

They can also install backdoor in the infected computer order to allow it to be used to attack other computers or websites. Phishing Phishing is a way to stealing identity information by using your trust. Usually you receive a fake email from a bank or something similar asking you to fill in a form were you give your details. These details may then be used to steal your money from your bank account or to access your computer or personal information. This can cause you to bankrupt if you give your details to the wrong person. ?? ?? ?? ?? 1 By Camille Metkowski 20631 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    In some cases the criminal will have a website set up which will require the input of banking/personal information; it will also enable the victim to view fictitious "bank accounts" with seemingly large available balances ready to transfer to him/her.

  2. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    * Information security Information security refers to keeping sensitive data safe and confidential. An organisation would need to keep data complete, precise and up-to-date. Data such as bank details, blood types, addresses and other such information needs to be kept secure and confidential.

  1. The impact of the availability of electric information on individuals and society

    rules or any other information in faster and in more convenient way, because the method of communication can be chosen. The availability of electronic information has changed the way non-public organisations advertise themselves as well. Let's say 20 years ago, the only way for advertising was TV; radio; stands and simple mails, leaflets or flyers.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    No one else can read it as only the data receiver has the decoder. Once the data receiver receives the encrypted data, it can be decoded by applying the decoder to the message and then it can be read normally.

  1. Smart Card System

    filters network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces. The router will examine each packet to determine whether to forward or drop the packet, based on the criteria that has been specified within the access control lists.

  2. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    had to be picked that was sufficiently large but also had to remain constant in order for the data to be easily analyzed. I decided that testing 1,000,000 starting points would be sufficient and give enough data to analyze. Looking at it from an outside view, 1,000,000 starting points would

  1. Ways of Promoting a Website

    the Netscape corporation although is a registered trademark of the Sun Microsystems group. Java script may be implemented in many ways; however the most common is to embed it within the code of the HTML. So what are the uses of the JavaScript language and why should we use them?

  2. Flexible Architectures in Communication Security Application

    but at the same time allows the intended recipient to retrieve the original information using a secret key. Cryptographic algorithms (or ciphers, as they are often called) are special programs designed to protect sensitive information on public communication networks. During encryption, ciphers transform the original plaintext message into unintelligible ciphertext.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work