Business & IT Department BTEC. Organisational System Security - Describe the various types of threats to organisations, systems and data

Authors Avatar

Assignment 1

Describe the various types of threats to organisations, systems and data – P1

  • Unauthorised access – This category covers internal and external threats. Internal threats are things such as:

Magic Disks - A recovery or backup disk that has been modded to include viruses or key loggers.

Man in the middle attacks – People extracting sensitive and confidential information whilst posing to be a customer, or a legitimate company.

Implanting Key loggers – Applications designed to record key strokes and send them back to the hacker.

External threats are this such as;

Viruses – Rouge applications designed to damage or make a system vunerable

Trojans – Applications designed to infiltrate a system often by posing to be a harmless file or embedded into another file.

Piggybacking – A term given to people who use someone else’s internet connection without authorisation. This is often undertaken by logging onto an unsecured network without permission.

Phishing – Attempting to fool a user into believing you are a legitimate service attempting to gain sensitive information.

  • Damage to or destruction of systems or information

Damage to systems can occur when devices fail such as hard drives failing or natural disasters occurring in the workplace that could result in damaged or destroyed places. Such as:

  1. Natural Disasters: This refers to what happens when data is lost as a result of natural disasters such as earth-quakes, floods, tsunami’s, terrorists, fires and such.
  2. Malicious Damage: This covers data that is lost, damaged, or stolen as a result of  a hacker of some sort. A hacker can implant a virus onto a system in order to damage the system or simply steal data such as credit card data.
  3. Technical Failure: Technical Failure covers when devices fail abruptly such a servers going down, power supply failing, hard-drives crashing ect.
  4. Human Errors: is when someone makes a mistake which results in data being lost. Incidents such as people accidentally deleting files and pulling plugs and such.
  5. Theft: Theft occurs when criminals gain access to an office building or other work environment and physically steal hardware and other entities that have a significant impact on the company (such as data).
Join now!

  • Information security

Information security refers to keeping sensitive data safe and confidential.

An organisation would need to keep data complete, precise and up-to-date. Data such as bank details, blood types, addresses and other such information needs to be kept secure and confidential.

  • Threats related to e-commerce

There are various security threats related to E-commerce. As websites that sell goods online rely solely on the availability and accessibility of an online store, they need to ensure the website is secure and not vulnerable to hackers. For example; Denial of Service attacks could prevent potential customers from purchasing ...

This is a preview of the whole essay

Here's what a teacher thought of this essay

Avatar

Quite a good introduction to this interesting topic but a few more technical details would have improved it