• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

IT Security Threats to Users and Businesses.

Extracts from this document...


Threats Unauthorised access: Internal & External There are many internal and external threats when using a system, because not everyone using the system is reliable and may choose to mess around with it and change things. E.g. the types of external threats are things like virus attacks hacking and data theft. And the types of internal threats are things like magic disks and key logging to damage your operating system from use within your system. Access causing damage to data or jamming resources e.g viruses People can access software and cause a lot of damage if they are harmful. This is gaining unauthorised access, and by doing this they can damage the data and jam resources to stop people using them, this is ristricting the user from using the software. This may go unnoticed by the user as they wont know what has been changed, even so its still an impact on the system. Accessing systems or data without damage; e.g phishing, identity theft, piggybacking, hacking Some of the threats can go unnoticed because of the way people choose to threaten your system, examples of these could be phishing were the purpose of this is to try and lure you into giving away information like contact details away. This can be done in many ways which are evolving all the time as its a recent threat that try's to get unauthorised access. A way in which phishing can be done is that an e-mail might be sent to you saying they are a friend that you knew a long time ago in school, and would like to find out where you live etc. ...read more.


And the short term damages being just as bad, because if the business cant track where the data is or get the credabilty back within the business it could get shut down completely with the business not being able to function without its data and financial figures to work with if they have no back-ups. Information security: Confidentiality The information will have to be kept secure so that the information doesnt get seen or put into the worng hands. The higher people in the business like managers will have to choose who see's the information and who doesnt also which of those people can update the information. Also they will have to decied how often the information is stored and reviewed. By doing this it helps make life easier for the managers because there will be only a certain handful of people that have access to that information. This means if any of that information is missing or has been corrupt then the manager will know it has to be one of those people. This means that the information is confidential between these people and therefore must not be used outside of the business by the people who have access to it, e.g. address's, phone numbers, bank balance etc. Integrity and Completeness of Data You must make sure you have the correct data as this can cause damage to the individual of the wrong information. Also to the business itself because they will look bad for not using and handling the data right. ...read more.


the disc's to see if they are any different from normal ones, pirate disc can sometimes have a different unside colour to the disc, that colour being blue. Also check where your buying you're product from, checking that it's a realiable source and it is licensed etc. You just have to be careful about what you buy and where you buy it from. Distribution mechanisms E.g Boot sales, Peer-to-peer Networks The distribution of media files such as music and films is seen as being pirate and sharing these files to be illegally downloaded can result in a heavy fine and can cause great damage to the user who downloads them and therefore the user's who upload the illeagal content. The files can be downloaded from sharing websites that use peer-to-peer networks, which means users make folder with the content in on there own server and then upload them to a central server for the website and for anybody to pretty much click on and download for free. The most popular type of this website was Napster until it got persude by music companies and bands, saying that it was unfair for user to download content for free. When others where going to shops and buying them like you normally would. By downloading the files music companies and artist wern't getting money so it was and is bad business, but it still goes onto with a popular sharing peer-to-peer website called Torrentz and use Bit torrentz to download them. Napster is now a legitimate service for online users. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    only movies on DVDs. The majority of its movies are Hollywood; however there are also movies from other film industries available such as Bollywood, and Cinemas of other countries. The DVDs come in a DVD sleeve, which also protects the disk from damage.

  2. Systems Security: Threats to computers

    Software that can try and retrieve any data from failed hard drives also exists, so that's also an option. To prevent future HDD failures, get software that can defrag your HDD on a regular basis. Or get a new HDD that is more reliable.

  1. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    selected the Make new Order button Test 24 I selected the View Current orders button Test 25 I selected the Return To Main Menu button Test 26 I selected the products button Test 27 I selected the Add a product button Text 28 I selected the edit/delete product button Test

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    When you do disclose personal information, you must send a privacy notification and obtain permission, either at the time of collection or prior to disclosing the information. You do not have to have a privacy notification if you are a not-for-profit organisation and your purpose is obvious, e.g.

  1. Threats to Data

    When the data is retrieved a reverse algorithm is used to make it make sense again. Most encryption algorithms are based on a key, a secret number which must be supplied along with the algorithm. This means a hacker would not only need to know the algorithm but also the key before he could translate the data.

  2. Wjec alevel ict creating a website

    This image was then copied into a new layer called image as shown below The final images To create the clips that appear in the loading screen is done by opening a new Adobe Flash CS3 document. Then insert the image for the thumb 1 button as shown below.

  1. Unit 34: E-commerce

    In conclusion, remember that not everyone has access to E-commerce: some people have no computer, no access to internet or simply can't afford it. Economic and Social Impact due to Speed of Changes Trading by e-commerce allows businesses to react to changes in the economy and society more quickly than a traditional business.

  2. BTEC IT Organisational Systems Security - outline of potential threats to an online business.

    Internal: This means that the damage has come from within the organisation itself, usually from an unhappy employee. Unfortunately you cannot trust all the people using your network or systems. It may include breaking or vandalising your systems or it may be deleting, altering or making sensitive or embarrassing business data public.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work