• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

security issue

Free essay example:

Unit: 15 Organisational System Security       BTEC National Diploma In ICT Practitioners Yr 2

Unit 15: Organisational System Security

Internet Security Issues

Adware –

Is a software which you get when you have downloaded a different program or software for free or at a reduced price. Its main purpose is to download adverts to your computer screen when you visit websites. Adware is seen by a developer as away to recover costs of making software. But to the general user adverts on there monitor are annoying because it puts them off of what there doing and they have to close every advert down manually.

Blackhat –

Is a name given to a hacker whose purpose is to access data with out permission and to damage it or change it. Blackhat hackers can do this for arrange of reasons to make profit or as a hobby. They may also send other users viruses, internet worms or spam them. This type of hacker is known as the bad guy in the computer world.

Botnet –

Is a software robot, when a spammer sends out viruses to general users a Bot is attached to it. Once the spammer has control of the infected computers then they will have to purchase a Botnet which then lets them operate the controlled computers, then the spammer will send out a message to the computers cause them to send spam to mail servers, resulting in users opening up there mail will have tons of junk.

Denial of service –

Is an attack which leaves users with out use of the services of a website which they would normally use. The DoS attack does not normally mean the controller of it has stolen information, but has cost the company which it has targeted money and time. This can cause users that use that company’s website to purchase what they want from another website meaning that company’s business rivals are making money from the DoS attack on them.

Exploit –

Is a software which contains commands that take advantage of a computer system with weak security, the purpose of an exploit is to give a user more privileges on a computer system allowing them to access more data which was previously restricted from them. A weakness in the exploit is that it stops running when a newer version of the software is installed.

Keylogger –

Is a device which you can get as software or hardware it is connected or installed inside your keyboard. Its function is to log in keystrokes. There are many different reasons why we may use this such as helping fix computer system errors or seeing how an employee users there keyboard to see if there good at there job. You can purchase Keylogger’s off the internet.

Malware –

Is a software, its task is to damage a computer system such as to give a computer system a virus. Malware gets its name from the beginning of the word malicious and the ending of the word software. Malware’s include arrange of harmful programs such as computer viruses, worms, Trojans, rootkits and sometimes adware.

Packet sniffing –

Is a software or hardware which is used to analyze traffic that is passing through over a network. The packet sniffer checks each packet then decodes them so that they can be analyzed, to check there content. The analyzing is useful for finding out network problems, monitor network usage from users and debug client and network protocols. This will help maintain a network.

Phishing –

Is a term given that is a breech of security by a hacker. Such as attempting to acquire sensitive information on other computer users like there usernames, passwords and credit card information. The hackers target popular websites such as eBay, MySpace and PayPal. They get hold of user’s personnel information by sending fake emails pretending to by your bank.

Piggybacking –

Is a computer word which refers to a user connecting there laptop or computer to another persons internet connection. Then using the internet without the permission of the owner of the internet connection. But if you own a café and have a hotspot this is not considered piggybacking because you have given permission to people to use your hotspot to connect to the internet.

Spyware –

Is a computer software that is secretly installed on to your computer and can take control over something’s that you do on it. It can install software which you did not want on your computer also it can make you go on websites that you did not click to go on and it could led you to harmful viruses that could affect your computer. When turning off your computer spyware can even change your computer settings.

Trojan –

A Trojan is a computer virus that appears on your computer designed to cause your computer harm. It has been know to be similar to a worm. Some Trojans may not cause harm to your computer but the six main types of Trojans are ones that cause remote access, data destruction, download, get on to a server, anti – viruses software disabler and denial of service attack.

Whitehat –

Is the name given to a hacker, who’s purpose is to prevent a breech of security within a company or organization. They are normally employed by a company to protect against there counterparts blackhat hackers who want to hack and steal information and data that does not belong to them. In the computing world the Whitehat hacker is know as the good guy.

Worm –

Is a computer program which sends copies of its self to networks, designed to cause harm to the network that they have targeted. It likes to eat up the bandwidth used on the network. Worms can also cause serious harm and damage to a computer operating system by attacking the weak parts of the computer.

Zero-day Attack –

Is a threat to computers, by trying to take control of computer applications that are unknown or patchfree. The attacker that controls the zero-day attack normally sets it up on a public forum because of the number of users that it could affect.

Zombie –

Is a computer that has been attached to the internet by a computer hacker. The owners of zombie computers do not know that there computers have be compromised. They are normally used as part of a botnet, but while they have been put in zombie mode the hacker can use other user’s computers to send Trojans or other harmful viruses.









Denial of service










Packet sniffing
















Zero-day Attack





Karl Leach – 30096577

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Related GCSE ICT Skills and Knowledge Essays

See our best essays

Related GCSE ICT Systems and Application essays

  1. Recommending hardware and software for an ebay company.

    All with internet access and also all of the computers and laptops can print from anywhere around the house. The purpose of the required system is because the business uses the PC at least 6 days a week for work purposes during office hours; however the computer is used for personal use in the evenings.

  2. Different types of technology How I use ICT at home and at school

    But then, the PS3's extremely useful ability to buy another external hard-drive for it solves this problem completely. The PS3 is compatible with various external hard drives meaning I have the potential to get as much space as I want.

  1. ICT Job Applications - Enricé's Tapas Bar.

    Date of Application Date/Time DD/MM/YYYY, from today. 28/11/2002 Interview Boolean Yes/No Yes Date of Interview Date/Time DD/MM/YYYY, from today. 28/11/2002 Offer Job Boolean Yes/No Yes Start Date Date/Time DD/MM/YYYY, from today. 28/11/2002 Start Time Date/Time DD/MM/YYYY, from today. 28/11/2002 Working Hours per Week Date/Time N/A 20 hours Hourly Wage Currency ´┐ŻNNN.NN form.

  2. The end user of my program is for the people applying for the insurance ...

    * The new system will also save a lot of time for staff workers having to sorting and checking data will also save a lot of time for staff sorting and checking data. Process and task description Before I build the new system I have to make sure I know

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work