Preview

Computer Threats and Security

Good Essays
Open Document
Open Document
2138 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Threats and Security
Table of Contents
What are IT attacks? 3
Virus Attack 3
Spam Mail 4
Port Scanning 4
System Compromise 5
Website defacement 5
BACKING UP OF IMPORTANT FILES 6 Acts of Human Error of Failure 7 Deliberate acts sabotage or vandalism 7 Deliberate acts of theft 8 Deliberate software attacks 8 Forces of nature 8 Technical hardware failure 8 Technical software failure 9
References 9

Question 1:

What are IT attacks?

In computer, an attack is any effort to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. An attack usually is perpetrated by someone with bad intentions. The general term used to describe the category of software used to logically attacking computers is called malware. IT Security risk means that there might be unauthorized access to or theft of proprietary data. Common people often post their business email addresses on external websites. These can be picked up and used to hack into other corporate accounts or flood employee in-boxes with unwanted spam. Installing unlawful wireless access points also increases the risk that outside agents could hack into company servers. It also degrades the quality of the internal wireless local area network system, subsequently potentially resulting in lost productivity.

A Threat is a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could violate security and cause harm. That is, a threat is a possible danger that might develop defencelessness.
A threat can be either intentional (e.g., an individual cracker) or "accidental" (e.g., the possibility of a computer malfunctioning).

[pic] security threats

Virus Attack

A virus is a small piece of software that piggybacks on real programs. A computer virus is a computer program that can reproduce and stretch from one computer to another. Viruses can increase



References: Information Technology Risks | eHow.com http://www.ehow.com/info_7954636_information-technology-risks.html#ixzz1ngxCYJ2G http://ist.mit.edu/security/backup http://uwacadweb.uwyo.edu/DTC/ThreatList.asp http://www.utica.edu/faculty_staff/qma/needforsecurity.pdf http://webfuse.cqu.edu.au/Courses/2008/T1/COIT13211/Study_Schedule/tute09.htm

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3110: Unit 1 Role Scenario 1) Identify threats to the seven domains of IT within the organization: A. User: Destroy data B. Workstation: Loss of data, not updated C. LAN: Unauthorized user, weak password D. LAN –WAN: Hackers, weak traffic filtering E. WAN- FTP anon uploads, DoS/DDoS F. System Application: Fire, DoS/DDoS, SQL injection corrupting data G. Remote: user virus, remote from office unsecure, VPN tunnel hack 2) Identify vulnerabilities in the seven domains of IT within the organization. A. User: Infected media, social engineering B. Workstation: OS vulnerability, browser vulnerability C. LAN: Worms, LAN OS vulnerability D. LAN-WAN: malicious websites, unblocked ports E. WAN: network outages F. System Application: ISP…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT2580 Final Study Guide

    • 1423 Words
    • 6 Pages

    7. Which of the following is any weakness in a system that makes it possible for a threat to cause it harm? (Page 96)…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    According to the PowerPoint presentation “A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device, software, data, information, or processing capability.” Therefore, some examples of digital security risks include unauthorized access and use, malicious internet and network attacks, hardware theft, system failures, software theft, and information theft. Additionally, sources of digital security risk are hackers, crackers, script kiddies, corporate spies, unethical employees, cyber extortionists, and cyber…

    • 541 Words
    • 3 Pages
    Good Essays
  • Good Essays

    | Describe the threats to system and information security and integrityThe possible threats to information security may be: from theft, unauthorised access, accidental file deletion, use of removable storage media; malicious programs (including viruses, trojans), hackers, phishing and identity theft; unsecured and public networks, default passwords and settings, wireless networks, Bluetooth, portable and USB devices.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    1. A user made unauthorized use of network resources by attacking network entities. You are potentially sabotaged by an employee or employer.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Computers of all kinds within an organisation are constantly faced with a variety of risks and exposures. It is helpful if we first define these terms:…

    • 1433 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Per APES 110 s290.132, the significance of any threat shall be evaluate and safeguards applied when necessary to eliminate the threat or reduce it to an acceptable level. The safeguards include:…

    • 931 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    xdgttedmk

    • 1230 Words
    • 5 Pages

    The significance of any threat created should be evaluated and, if the threat is other than clearly insignificant, safeguards should be considered and applied as necessary to eliminate the threat or reduce it to an acceptable level. Such safeguards might include (fees)…

    • 1230 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    A threat includes any unfavorable situation, trend or impending change in an organizations environment that is currently or potentially damaging or threatening to its ability to compete. It may be a barrier, constraint, or anything that might inflict problems, damages, harm or injury to the organization.…

    • 990 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Personal safety

    • 4792 Words
    • 20 Pages

    threats is the first step in reducing the likelihood of a safety or security incident.…

    • 4792 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Individual attacks

    • 362 Words
    • 2 Pages

    In my opinion threats can be divided in 2 groups:expected and unexpected.The expected threats are the ones that we are aware of and somehow try to stay protected from them.It can be either threat of war or social and environmental threats.And the other is unexpected,which is attack by the representative of some terroristic organization or just by psychologically damaged person.…

    • 362 Words
    • 2 Pages
    Satisfactory Essays