• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

IT Security Threats to Users and Businesses.

Extracts from this document...

Introduction

Threats Unauthorised access: Internal & External There are many internal and external threats when using a system, because not everyone using the system is reliable and may choose to mess around with it and change things. E.g. the types of external threats are things like virus attacks hacking and data theft. And the types of internal threats are things like magic disks and key logging to damage your operating system from use within your system. Access causing damage to data or jamming resources e.g viruses People can access software and cause a lot of damage if they are harmful. This is gaining unauthorised access, and by doing this they can damage the data and jam resources to stop people using them, this is ristricting the user from using the software. This may go unnoticed by the user as they wont know what has been changed, even so its still an impact on the system. Accessing systems or data without damage; e.g phishing, identity theft, piggybacking, hacking Some of the threats can go unnoticed because of the way people choose to threaten your system, examples of these could be phishing were the purpose of this is to try and lure you into giving away information like contact details away. This can be done in many ways which are evolving all the time as its a recent threat that try's to get unauthorised access. A way in which phishing can be done is that an e-mail might be sent to you saying they are a friend that you knew a long time ago in school, and would like to find out where you live etc. ...read more.

Middle

And the short term damages being just as bad, because if the business cant track where the data is or get the credabilty back within the business it could get shut down completely with the business not being able to function without its data and financial figures to work with if they have no back-ups. Information security: Confidentiality The information will have to be kept secure so that the information doesnt get seen or put into the worng hands. The higher people in the business like managers will have to choose who see's the information and who doesnt also which of those people can update the information. Also they will have to decied how often the information is stored and reviewed. By doing this it helps make life easier for the managers because there will be only a certain handful of people that have access to that information. This means if any of that information is missing or has been corrupt then the manager will know it has to be one of those people. This means that the information is confidential between these people and therefore must not be used outside of the business by the people who have access to it, e.g. address's, phone numbers, bank balance etc. Integrity and Completeness of Data You must make sure you have the correct data as this can cause damage to the individual of the wrong information. Also to the business itself because they will look bad for not using and handling the data right. ...read more.

Conclusion

the disc's to see if they are any different from normal ones, pirate disc can sometimes have a different unside colour to the disc, that colour being blue. Also check where your buying you're product from, checking that it's a realiable source and it is licensed etc. You just have to be careful about what you buy and where you buy it from. Distribution mechanisms E.g Boot sales, Peer-to-peer Networks The distribution of media files such as music and films is seen as being pirate and sharing these files to be illegally downloaded can result in a heavy fine and can cause great damage to the user who downloads them and therefore the user's who upload the illeagal content. The files can be downloaded from sharing websites that use peer-to-peer networks, which means users make folder with the content in on there own server and then upload them to a central server for the website and for anybody to pretty much click on and download for free. The most popular type of this website was Napster until it got persude by music companies and bands, saying that it was unfair for user to download content for free. When others where going to shops and buying them like you normally would. By downloading the files music companies and artist wern't getting money so it was and is bad business, but it still goes onto with a popular sharing peer-to-peer website called Torrentz and use Bit torrentz to download them. Napster is now a legitimate service for online users. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    There are many reasons why ICT systems confer such an advantage to organisations that are willing to implement them, and these reasons include: * Increased Security: - Data held within a well-designed ICT system is more secure than data held using traditional methods.

  2. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    This makes it easy to find a movie by entering the title, actor or director details of the movie and finally clicking on Go. Below I have shown a screenshot the categories, by which films can be found. Using the navigation bar it also makes it very easy to go return to the Homepage by clicking on the HOME button.

  1. Systems Security: Threats to computers

    Software that can try and retrieve any data from failed hard drives also exists, so that's also an option. To prevent future HDD failures, get software that can defrag your HDD on a regular basis. Or get a new HDD that is more reliable.

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    14 Database Password Does the 'enter password' box appear when the database is opened. When the password is entered, does it open? When I open the database, I should be met by a message box telling me to enter the password.

  1. From the e-commerce strategy you gave me earlier I understand that by having a ...

    If your organisation (Bolton Area Divers) oversteps their legal powers, or uses them inappropriately. 3. If you copy a copyrighted item without permission 4. If you breach a binding contract. 5. "a breach of industry-specific legislation or regulations"[1] 6.

  2. Wjec alevel ict creating a website

    first key frame of the movie clip I inserted the code stop (); this means that when the flash animation enters the movie clip it will initially stop at the first frame. There will be code later added to one of the other animation to move past this first frame activating further code.

  1. Unit 34: E-commerce

    In conclusion, remember that not everyone has access to E-commerce: some people have no computer, no access to internet or simply can't afford it. Economic and Social Impact due to Speed of Changes Trading by e-commerce allows businesses to react to changes in the economy and society more quickly than a traditional business.

  2. BTEC IT Organisational Systems Security - outline of potential threats to an online business.

    Furthermore increased costs may be incurred due to legal action if sensitive data is stolen. Malicious damage: This is defined as the deliberate and intentional harming of property. There are several forms of malicious damage that your business systems may face which I will outline below.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work