ICT Security Report

Authors Avatar

Tom Davies

SECURITY

INTRODUCTION

In this day an age with many companies and well-known organisations functioning online as well as in many towns and cities. In order to attract and gain customers to accumulate business they must try and obtain their customer’s confidence and trust. They try to do this by demonstrating that they take such dangers to data security incredibly seriously. Throughout this report I will identify and break down numerous threats and discuss methods by which these online associations can protect themselves from these data security threats.

As of the 22nd August 2008 the number of breaches through this current stands at a total of 449. This is considered to be a rather small number compared to the number business, governmental, health, banking and educational entities that have databases. Though this has surpassed the total taken from 2007, which were 446. Although, the number has not increased by a huge amount we can still observe that identity theft continues to rise year by year.

As an example, the transactional website I studied, Play.com hold a variety of information about myself such as my name and address and then my card details which I would use to pay for the items. For this to be held by the company you must believe that the site is incredibly safe and that you have great confidence with buying with this company.


INTERNAL THREATS

There are a number of internal threats that can target your business and break it down by stealing the identity of your customers. This includes dishonest employees, system crashes or natural disasters and human errors such as losing data in the post.

Dishonest Employees

Dishonest employees can be seen as people who eat in to the business’ bottom line profits. It is believed that dishonest employees pilfer more of a business’ profit than shoplifters. During 2005, alone it is understood that more than £1.5bn was stolen from British retailers alone. As well as just stealing from their employers, dishonest employees can use their position to manipulate and obtain customer information such as their bank details. By doing this they can then purchase items for themselves off transactional websites. As well as swindling the customers bank details they can also take there obtain the customers identity to commit other fraud offences such as selling the information off on the black market. An example of this was when an employee, a senior level database administrator of Fidelity National Information Services, a major US financial processing company 2.3 million consumer records containing bank account and credit card information as well as other personal information. Of the approximately 2.3 million records that have been pilfered, about 2.2 million contain bank account information and 99,000 contain credit card information.

Natural Disasters

Another internal threat that maybe encountered is that customer information could be lost when a company’s system either crashes or if a natural disaster such as floods and earthquakes occurs. If an incident like this occurs it may lead to the company’s customers’ information either being lost or being out there for anyone to view. In order to try and stop this from happening companies should install backups to help with security problems. To try and over come this potential problem a back up needs to be kept at an alternative location, somewhere where both sites could not be affected by the same disaster at the same time. As this would enable the safety of the data even thought one of the system has be hit. A specific example that occurred on 11th September 2001 when both the World Trade Centre (primary site) and the 7 World Trade Centre (recovery site) were both destroyed in the terrorist attack. This meant that millions of people’s security details were at threat of being stolen. And hundreds of coming being `forced to be closed done due to their customers’ details dissolving. Another example of this happening were when both the primary site and recovery site of Jefferson Parish both being hit causing large amounts of damage in New Orleans due to Hurricane Katrina in 2005.

System Crashes

Also, if the main server of system of the site crashes potential information containing customer’s security details can leak out and mean that it would no longer be confidential and can also mean that people could obtain it. The site being bombarded with people logging on to the site can initiate a system crash, because the company’s server is unable to deal with the amount of people logging on at the same time.  This could lead to a company or organisation losing all the data that would have been saved on the organisation’s server. In order to try and stop this from happening companies should install backups to help with security problems.

Human Error

Another way in which a customer’s personal data maybe lost by a business is by human error. And over recent years this has become of business director’s biggest fears. This human error could be in the form of them losing data within the post by mailing it to the correct address or by the employee inputting incorrect data into their server. An example of this occurred during September 2008, in Indianapolis in the United States. When a human error led the posting of the personal data of about 3,300 individuals charged with minor drug and alcohol offences to the city of Indianapolis's Website. The spreadsheet containing the names, Social Security numbers, and addresses of the individuals was accessible via the Website for at least 11 days. The only real way that this form of internal threat can be stopped is by having the company put on training for staff stating how important it is that they much get address correct and input correct data. They could repeat this process numerous times within the year to make sure it sticks with their employees. They could also only use special delivery so that they are sure it goes to the correct address and the person specially signs that it whom it is to.

Join now!

EXTERNAL THREATS

A business can also face many potential external threats that may try to retrieve or pilfer customer data. These external threats include hackers, viruses and Trojans, phishing, denial of services (DOS), operating problem services and by using public computers of wireless networks.

Hackers

Hackers are people who enjoy playing with computers, a small minority of whom commit computer crime for the intellectual challenge of breaking into a computer. They are individuals who generally gain access and exploit computer systems and networks without their owners' knowledge or consent.

The attacks can either be malicious ...

This is a preview of the whole essay