• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

IT Security Threats to Users and Businesses.

Extracts from this document...

Introduction

Threats Unauthorised access: Internal & External There are many internal and external threats when using a system, because not everyone using the system is reliable and may choose to mess around with it and change things. E.g. the types of external threats are things like virus attacks hacking and data theft. And the types of internal threats are things like magic disks and key logging to damage your operating system from use within your system. Access causing damage to data or jamming resources e.g viruses People can access software and cause a lot of damage if they are harmful. This is gaining unauthorised access, and by doing this they can damage the data and jam resources to stop people using them, this is ristricting the user from using the software. This may go unnoticed by the user as they wont know what has been changed, even so its still an impact on the system. Accessing systems or data without damage; e.g phishing, identity theft, piggybacking, hacking Some of the threats can go unnoticed because of the way people choose to threaten your system, examples of these could be phishing were the purpose of this is to try and lure you into giving away information like contact details away. This can be done in many ways which are evolving all the time as its a recent threat that try's to get unauthorised access. A way in which phishing can be done is that an e-mail might be sent to you saying they are a friend that you knew a long time ago in school, and would like to find out where you live etc. ...read more.

Middle

And the short term damages being just as bad, because if the business cant track where the data is or get the credabilty back within the business it could get shut down completely with the business not being able to function without its data and financial figures to work with if they have no back-ups. Information security: Confidentiality The information will have to be kept secure so that the information doesnt get seen or put into the worng hands. The higher people in the business like managers will have to choose who see's the information and who doesnt also which of those people can update the information. Also they will have to decied how often the information is stored and reviewed. By doing this it helps make life easier for the managers because there will be only a certain handful of people that have access to that information. This means if any of that information is missing or has been corrupt then the manager will know it has to be one of those people. This means that the information is confidential between these people and therefore must not be used outside of the business by the people who have access to it, e.g. address's, phone numbers, bank balance etc. Integrity and Completeness of Data You must make sure you have the correct data as this can cause damage to the individual of the wrong information. Also to the business itself because they will look bad for not using and handling the data right. ...read more.

Conclusion

the disc's to see if they are any different from normal ones, pirate disc can sometimes have a different unside colour to the disc, that colour being blue. Also check where your buying you're product from, checking that it's a realiable source and it is licensed etc. You just have to be careful about what you buy and where you buy it from. Distribution mechanisms E.g Boot sales, Peer-to-peer Networks The distribution of media files such as music and films is seen as being pirate and sharing these files to be illegally downloaded can result in a heavy fine and can cause great damage to the user who downloads them and therefore the user's who upload the illeagal content. The files can be downloaded from sharing websites that use peer-to-peer networks, which means users make folder with the content in on there own server and then upload them to a central server for the website and for anybody to pretty much click on and download for free. The most popular type of this website was Napster until it got persude by music companies and bands, saying that it was unfair for user to download content for free. When others where going to shops and buying them like you normally would. By downloading the files music companies and artist wern't getting money so it was and is bad business, but it still goes onto with a popular sharing peer-to-peer website called Torrentz and use Bit torrentz to download them. Napster is now a legitimate service for online users. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Different access rights can also be assigned to employees within an organisation of a hierarchal structure. This means that only data appropriate to an employee's role in the business is accessible by them. * Increased storage capacity: - The hard disk of a computer can store an incredible amount of data in such a small volume of space.

  2. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    Here the customer is asked to enter their name and address details and finally click on Continue to proceed to the next step. I was not able to go any further, because I was not able to enter any false details and anyway this could have been seen as fraud, bringing me into trouble.

  1. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    more things while they are at it, if they are satisfied with the service they were provided with they may feel happy with the company and become more loyal. Across a larger scale of customers this will build their customer loyalty base greatly and in the process will generate more sales.

  2. The Impact of Mobile Phones on social Interaction

    networks, keeping up to date with latest technology and being involved in the business of trading mobile phones. All these reasons will be looked at in greater depth later in this report. Nevertheless, the underlying feature is that mobile phones are very common amongst 13-18 year olds and this trend of growth seems like continuing.

  1. Systems Security: Threats to computers

    When the hard drive is booted or just while it's running, it suddenly fails and stops working, this can cause a loss of data. To deal with a current situation with this, you could take your failed HDD to a specialist that deals with these types of problems.

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    Town/City, Postcode, Telephone Number, Balance �, Balance � Order Details Order ID, Customer ID, VAT, Order Date, Delivery Price, Total �, Total � Items Ordered Order ID, Product ID, Quantity, Total Price Product Details Name, Colour, Stock, Price, Image Outputs Reports A list of customers and payment details A list

  1. From the e-commerce strategy you gave me earlier I understand that by having a ...

    These requests cannot be rejected on just the basis of the cost. If any requests are refused, there is a right of appeal to the Information Commissioner's Office. This will affect Bolton Area Divers in the way that you can request environmental information or other types of relevant information that may be of interest to divers.

  2. BTEC IT Organisational Systems Security - outline of potential threats to an online business.

    Furthermore increased costs may be incurred due to legal action if sensitive data is stolen. Malicious damage: This is defined as the deliberate and intentional harming of property. There are several forms of malicious damage that your business systems may face which I will outline below.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work