• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

System security Describe the potential impact of four different threats - Virus, Trojans,Worms and Phishing.

Extracts from this document...


Unit 15: Organisational Systems Security P2-Describe the potential impact of four different threats Virus Virus attacks your computer by attaching itself to another program for example a spreadsheet program. So each time a spreadsheet runs the virus runs as well and has a chance to reproduce and attach to other programs. Viruses allow other people to access your personal information that you give over the internet especially if you are shopping or managing your bank account a various can be used for identity theft. Some viruses can also slow down your computer, delete information and important data or even shut down your computer. ...read more.


Trojans work by carrying programs in the files you downloaded from the email or a device. These programs allow someone (a hacker) to have a complete access to your computer. Trojan often destroys your computer functionality and that way it allows the hacker to use your computer and you don't know what he is doing. Hackers use Trojans to open backdoors to your computer and that way they have access to all your files on your computer and even they can access your network. Very complexes Trojans can install a dialler and that way they can use your modem which could end up with a big phone bill. ...read more.


They can also install backdoor in the infected computer order to allow it to be used to attack other computers or websites. Phishing Phishing is a way to stealing identity information by using your trust. Usually you receive a fake email from a bank or something similar asking you to fill in a form were you give your details. These details may then be used to steal your money from your bank account or to access your computer or personal information. This can cause you to bankrupt if you give your details to the wrong person. ?? ?? ?? ?? 1 By Camille Metkowski 20631 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    Its pattern is said to be predictable. It will usually entice the victim into parting with their banking/private information with large sums of money allegedly due to them. It may name high ranking officials and forged official and or legal documentation to endorse legitimacy. It may involve a high profile investment portfolio, easily researchable by the victim

  2. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    * Threats related to e-commerce There are various security threats related to E-commerce. As websites that sell goods online rely solely on the availability and accessibility of an online store, they need to ensure the website is secure and not vulnerable to hackers.

  1. Ways of Promoting a Website

    Student name - Ricki Lambert Student no. - 20028006 Course title National Diploma IT Practitioners. Course code - 14FONDITPRA Site address - www.rickla.hungryhosting.com Identify the potential audience for your site - The potential audience for my website will be any age or sex of football fan, preferably Tottenham Hotspur fans

  2. Smart Card System

    Cryptography is the science of information security. Examples of cryptography techniques include microdots, merging words with images and etc. However, cryptography is most often associated with scrambling plaintext into ciphertext, then back again. Individuals who practice this field are known as cryptographers.

  1. Flexible Architectures in Communication Security Application

    Public-key ciphers (or asymmetric-key ciphers) use a well-known public key to encrypt and require a different private key to decrypt. The process may also be reversed to produce what is known as a digital signature. Digital signatures authenticate the sender.

  2. Creating a computer system for Wooten Basset Rugby Club

    Each team will be assigned a unique in case of two teams having the same name. Team Name - Name of each rival team. Telephone Address1 - First line of each team's address. Address2 - Second line of each team's address if applicable.

  1. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    For example, the client device must maintain a "history list" of recently visited decks, so that the user may navigate "backwards". The Session layer includes the Wireless Session Protocol (WSP) and Wireless Transport Layer Security (WTLS). They provide connection-based services to the application layer - WAE and WTA.

  2. The impact of the availability of electric information on individuals and society

    Some people in democratic countries, such as Great Britain don't have an access to the internet because of many number of reasons. A survey made in 2008 shows that most families don't have it because they just don't need it and don't feel demand of it; others said that it

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work