IT Security Threats to Users and Businesses.

Authors Avatar

Threats

Unauthorised access:

Internal & External

 

There are many internal and external threats when using a system, because not everyone using the system is reliable and may choose to mess around with it and change things. E.g. the types of external threats are things like virus attacks hacking and data theft. And the types of internal threats are things like magic disks and key logging to damage your operating system from use within your system.

Access causing damage to data or jamming resources e.g viruses

People can access software and cause a lot of damage if they are harmful. This is gaining unauthorised access, and by doing this they can damage the data and jam resources to stop people using them, this is ristricting the user from using the software. This may go unnoticed by the user as they wont know what has been changed, even so its still an impact on the system.

 

Accessing systems or data without damage;
e.g phishing, identity theft, piggybacking, hacking

Some of the threats can go unnoticed because of the way people choose to threaten your system, examples of these could be phishing were the purpose of this is to try and lure you into giving away information like contact details away. This can be done in many ways which are evolving all the time as its a recent threat that try's to get unauthorised access. A way in which phishing can be done is that an e-mail might be sent to you saying they are a friend that you knew a long time ago in school, and would like to find out where you live etc. There is also hacking where people try to access your PC and get information usually when the network traffic is corrupted, and piggybacking can usually be performed when there is a save communication but with that is a harmful virus that will try to attack. Identity theft is where another e-mail could be sent to you e.g. from your bank saying you need to update your details and you will have to click a link to type in your details. Where this is then a bogus site and your giving your details striaght to the criminal.

Damage to or destruction of systems or information:

Natural disasters

Join now!

Damage can be caused to systems through natural disasters and can cause things from floods to fires and power loss. This means that the systems should be able to cope with extreme disasters, things that can be done are using remote storage of data and backing up the files everyday so that you always have a copy. You have to make sure that you have your data save and secure for if and when these disasters strike.

 

Malicious damage (internal and external causes)

Malicious damage is unpredictable and therfore cant really be prepaired for but means that the ...

This is a preview of the whole essay