• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

IT Security Threats to Users and Businesses.

Extracts from this document...


Threats Unauthorised access: Internal & External There are many internal and external threats when using a system, because not everyone using the system is reliable and may choose to mess around with it and change things. E.g. the types of external threats are things like virus attacks hacking and data theft. And the types of internal threats are things like magic disks and key logging to damage your operating system from use within your system. Access causing damage to data or jamming resources e.g viruses People can access software and cause a lot of damage if they are harmful. This is gaining unauthorised access, and by doing this they can damage the data and jam resources to stop people using them, this is ristricting the user from using the software. This may go unnoticed by the user as they wont know what has been changed, even so its still an impact on the system. Accessing systems or data without damage; e.g phishing, identity theft, piggybacking, hacking Some of the threats can go unnoticed because of the way people choose to threaten your system, examples of these could be phishing were the purpose of this is to try and lure you into giving away information like contact details away. This can be done in many ways which are evolving all the time as its a recent threat that try's to get unauthorised access. A way in which phishing can be done is that an e-mail might be sent to you saying they are a friend that you knew a long time ago in school, and would like to find out where you live etc. ...read more.


And the short term damages being just as bad, because if the business cant track where the data is or get the credabilty back within the business it could get shut down completely with the business not being able to function without its data and financial figures to work with if they have no back-ups. Information security: Confidentiality The information will have to be kept secure so that the information doesnt get seen or put into the worng hands. The higher people in the business like managers will have to choose who see's the information and who doesnt also which of those people can update the information. Also they will have to decied how often the information is stored and reviewed. By doing this it helps make life easier for the managers because there will be only a certain handful of people that have access to that information. This means if any of that information is missing or has been corrupt then the manager will know it has to be one of those people. This means that the information is confidential between these people and therefore must not be used outside of the business by the people who have access to it, e.g. address's, phone numbers, bank balance etc. Integrity and Completeness of Data You must make sure you have the correct data as this can cause damage to the individual of the wrong information. Also to the business itself because they will look bad for not using and handling the data right. ...read more.


the disc's to see if they are any different from normal ones, pirate disc can sometimes have a different unside colour to the disc, that colour being blue. Also check where your buying you're product from, checking that it's a realiable source and it is licensed etc. You just have to be careful about what you buy and where you buy it from. Distribution mechanisms E.g Boot sales, Peer-to-peer Networks The distribution of media files such as music and films is seen as being pirate and sharing these files to be illegally downloaded can result in a heavy fine and can cause great damage to the user who downloads them and therefore the user's who upload the illeagal content. The files can be downloaded from sharing websites that use peer-to-peer networks, which means users make folder with the content in on there own server and then upload them to a central server for the website and for anybody to pretty much click on and download for free. The most popular type of this website was Napster until it got persude by music companies and bands, saying that it was unfair for user to download content for free. When others where going to shops and buying them like you normally would. By downloading the files music companies and artist wern't getting money so it was and is bad business, but it still goes onto with a popular sharing peer-to-peer website called Torrentz and use Bit torrentz to download them. Napster is now a legitimate service for online users. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    The speed and expediency in which data is transmitted and processed within a computerised system saves much time and therefore money for the organisation. * Manipulation of Data: - The manipulation of data within a paper-based system requires the record to first be located.

  2. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    By luck I was able to find the answer to the question What does LatestDVD9.com promises on Credit Card Security? The answer to this question is shown below in the print-screen. How easy is it to make transactions? A transaction can be done very easily because you simply have to

  1. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    need to, it keeps the customers interested in the company because they receive a newsletter every month and therefore they do not forget about them, it may entice the customers to register in the first place (to be able to receive them)

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    (P3, EP3) The Data Protection Act that you have just mentioned seems to be a really important one and it sounds as though that there may be many risks or threats to the e-commerce section, could you please explain these issues in depth.

  1. Wjec alevel ict creating a website

    bar moves to the left but also checks it position in relation to the background. When the far left hand side of the scroll movie clip reaches an x position of 97 (its original position - see earlier) it will stop the scroll bar from moving any further to the left.

  2. Unit 34: E-commerce

    'Bricks' have customers that visit daily or weekly and that trust the store and its products; provided that the store keeps the house style (font type, logos, colours) then those customers will know that they are the same business and that the site can also be trusted.

  1. Expert Systems are used in all sectors of organizations to help aid users with ...

    It took over a decade to gather information from relevant chemists, genetics and computers scientists. Then MACSYMA, was designed in 1968 by Carl Engleman, William Martin and Joel Moses. It was a large interactive mathematics expert system used by MIT to manipulate mathematical expressions symbolically.

  2. Communication within Businesses

    Cost Boots can afford to buy technology to have meetings through video and so the people on the other side (where the meeting is held) will be able to see the director of a particular sector of the business and discuss with them.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work