• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

IT Security Threats to Users and Businesses.

Extracts from this document...


Threats Unauthorised access: Internal & External There are many internal and external threats when using a system, because not everyone using the system is reliable and may choose to mess around with it and change things. E.g. the types of external threats are things like virus attacks hacking and data theft. And the types of internal threats are things like magic disks and key logging to damage your operating system from use within your system. Access causing damage to data or jamming resources e.g viruses People can access software and cause a lot of damage if they are harmful. This is gaining unauthorised access, and by doing this they can damage the data and jam resources to stop people using them, this is ristricting the user from using the software. This may go unnoticed by the user as they wont know what has been changed, even so its still an impact on the system. Accessing systems or data without damage; e.g phishing, identity theft, piggybacking, hacking Some of the threats can go unnoticed because of the way people choose to threaten your system, examples of these could be phishing were the purpose of this is to try and lure you into giving away information like contact details away. This can be done in many ways which are evolving all the time as its a recent threat that try's to get unauthorised access. A way in which phishing can be done is that an e-mail might be sent to you saying they are a friend that you knew a long time ago in school, and would like to find out where you live etc. ...read more.


And the short term damages being just as bad, because if the business cant track where the data is or get the credabilty back within the business it could get shut down completely with the business not being able to function without its data and financial figures to work with if they have no back-ups. Information security: Confidentiality The information will have to be kept secure so that the information doesnt get seen or put into the worng hands. The higher people in the business like managers will have to choose who see's the information and who doesnt also which of those people can update the information. Also they will have to decied how often the information is stored and reviewed. By doing this it helps make life easier for the managers because there will be only a certain handful of people that have access to that information. This means if any of that information is missing or has been corrupt then the manager will know it has to be one of those people. This means that the information is confidential between these people and therefore must not be used outside of the business by the people who have access to it, e.g. address's, phone numbers, bank balance etc. Integrity and Completeness of Data You must make sure you have the correct data as this can cause damage to the individual of the wrong information. Also to the business itself because they will look bad for not using and handling the data right. ...read more.


the disc's to see if they are any different from normal ones, pirate disc can sometimes have a different unside colour to the disc, that colour being blue. Also check where your buying you're product from, checking that it's a realiable source and it is licensed etc. You just have to be careful about what you buy and where you buy it from. Distribution mechanisms E.g Boot sales, Peer-to-peer Networks The distribution of media files such as music and films is seen as being pirate and sharing these files to be illegally downloaded can result in a heavy fine and can cause great damage to the user who downloads them and therefore the user's who upload the illeagal content. The files can be downloaded from sharing websites that use peer-to-peer networks, which means users make folder with the content in on there own server and then upload them to a central server for the website and for anybody to pretty much click on and download for free. The most popular type of this website was Napster until it got persude by music companies and bands, saying that it was unfair for user to download content for free. When others where going to shops and buying them like you normally would. By downloading the files music companies and artist wern't getting money so it was and is bad business, but it still goes onto with a popular sharing peer-to-peer website called Torrentz and use Bit torrentz to download them. Napster is now a legitimate service for online users. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Whilst there are ways in which computer hackers can break into systems, it requires much more from the criminal than simply bludgeoning a lock with a hammer. The digital age requires a smarter breed of criminal. The more secure data is within a system, the more money that is saved from not having data stolen.

  2. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    I believe that making a transaction is not really made easy, because there is no possibility for customers to log in using username and password, which would make it easier and allow customers to make transactions faster. However the website allows customers to add DVDs to the cart, which is really an advantage.

  1. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    need to, it keeps the customers interested in the company because they receive a newsletter every month and therefore they do not forget about them, it may entice the customers to register in the first place (to be able to receive them)

  2. The Impact of Mobile Phones on social Interaction

    of mobile etiquette whilst some train companies such as Midland Mainline are offering customers "mobile free carriages". This view is reflected by Charles Golvin (Cited in (8) ), a senior research analyst at Forrester research who comments "as more people begin using cell phones, they're also learning to be more socially aware".

  1. Systems Security: Threats to computers

    When the hard drive is booted or just while it's running, it suddenly fails and stops working, this can cause a loss of data. To deal with a current situation with this, you could take your failed HDD to a specialist that deals with these types of problems.

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    Currency The balance of the business in pounds. Presence Check Type Check Balance (�) Currency The balance of the business in euros Presence Check Type Check Entities with attributes Business Table Order Table Field Data Type Length Description Validation OrderID Auto Number Long Integer A unique one or two digit code to represent a particular order from a

  1. From the e-commerce strategy you gave me earlier I understand that by having a ...

    Distance Selling Act Distance Selling Act of 2000 is an act of parliament that protects consumers when buying over long distances such as The Internet, telephone and mail order, and other forms of long distance trading. You have seven working days from once you receive your product to decide if you are sending them back or not.

  2. BTEC IT Organisational Systems Security - outline of potential threats to an online business.

    Furthermore increased costs may be incurred due to legal action if sensitive data is stolen. Malicious damage: This is defined as the deliberate and intentional harming of property. There are several forms of malicious damage that your business systems may face which I will outline below.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work