Table of contents:

  1. Introduction
  2. Existing threats and risks
  3. What a virus is and how to protect a computer
  4. General controls
  5. Application controls
  6. Summary conclusion

Introduction

Information has no value in itself. Nowadays any company stores its information on its computers.  Information is now considered so important that it is regarded as a factor of production, labour, enterprise and capital. Whether it is a revenue company or any other organisation it is necessary to keep a record of events in the company in order to maintain its operational activities.

The main aim of this assignment is to increase the awareness of users in the area of information security in order to be able to secure our personal data better then before.

In this assignment I’ll try to investigate and analise the main objectives such as:

  • Why computerised systems are particularly important
  • The major risks and threats to computer security
  • How to deal with computer misuse, such as hacking and viruses
  • How to protect your computer from harmful program
  • How back up can be put in place for essential computer facilities

Many organisations today are highly dependent on their Information Systems and must be mindful that all IT resources are not immediately replaceable in the event of damage or destruction. Replacing a mainframe computer, for example, could involve a lead time of several months. It would be crap for any commercial company who does its business on internet or in event loosing of valuable government information. The consequences of a security failure may be very serious. It is important that our computer system is protected at all times. This is so in order to keep data secure and reliable. A breach of security in a computer can lead to a great loss which can not be quantified in any manner.

So far we have known some types of risks and threats to computer systems in organisations.

They are being:

  1. Accidental error
  2. Deliberate damage
  3. Fraud

To these categories I would also add a Physical threat, Unauthorised access and Malicious misuse. Let’s have a look on each of them.

Accidental error 

This is an important security issue which computer security experts should always put into consideration when designing security measures for a system. Accidental errors could occur at any time in a computer system but if we do have proper checks in place then it could not be the major concern. Accidental error includes corruption of data caused by programming error, user or operator error.  

Physical threat

A threat to a computer system could be as a result of loss of the whole computer system, damage of hardware, damage to the computer software, theft of the computer system, vandalism, natural disaster such as flood, fire, war, earthquakes etc. Acts of terrorism such as the attack on the world trade centre is also one of the major threats to computer which can be classified as physical threat.

Another good example of a physical threat to computer system is the flooding of the city of New Orleans (Hurricane Katrina) during which valuable information was lost and billions of computer data were destroyed.

Unauthorised access

Dada stored on the computer system has to be accessed for it to be translated into useful information. This also poses a great security threats to the computer system due to unauthorised person's having access to the system. Not only this, information can be accessed via a remote system in the process of being transmitted from one point to the other via network media which includes wired and wireless media. Considering an example of an organisation in which a member of staff at a particular level of hierarchy within the establishment is only allowed access to specific area according to the policy of the organisation. If these employees by other means not set in the organisation policy gain access to the restricted data area on the computer, this can be termed an unauthorised access.

Taking the banking sector as an example, imagine what could happen if an unauthorised personnel is allowed to break into the bank system and access all customers details. This could lead to an unquantifiable fraud in the bank which could lead to loss of billions of euros and at the same time makes the bank vulnerable to legal issues which could collapse the whole organisation.

Malicious misuse

Any form of tampering of the computer system which includes penetration, Trojan horses’ viruses and any form of illegal alteration of the computer system which also includes the generation of illegal codes to alter the standard codes within the system can be termed as malicious misuse. This could also lead to a great financial loss and should be prevented in all cases. What worse is when a malicious programmer can take an advantage of an insecure system to send malicious software (viruses) from one particular system to millions of computer in a matter of minutes, military information could be extracted and used to cause conflicts within nations for instance.

Join now!

E-mail spam

Because "spam" – junk e-mail is so cheap and easy to create, fraudsters increasingly use it to find investors for investment schemes or to spread false information about a company. Using a bulk e-mail program, spammers can send personalised messages to thousands and even millions of Internet users at a time. One of the fraud examples may be The "Risk-Free" Fraud which can involve you into “Exciting, low-Risk Investment Opportunities”. It may sounds like exotic investments, such as prime bank securities or a wireless cable projects for instance. And sometimes the investment products do not even exist they ...

This is a preview of the whole essay