Table of Contents
What are IT attacks?
BACKING UP OF IMPORTANT FILES
Acts of Human Error of Failure
Deliberate acts sabotage or vandalism
Deliberate acts of theft
Deliberate software attacks
Forces of nature
Technical hardware failure
Technical software failure
What are IT attacks?
In computer, an attack is any effort to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. An attack usually is perpetrated by someone with bad intentions. The general term used to describe the category of software used to logically attacking computers is called malware. IT Security risk means that there might be unauthorized access to or theft of proprietary data. Common people often post their business email addresses on external websites. These can be picked up and used to hack into other corporate accounts or flood employee in-boxes with unwanted spam. Installing unlawful wireless access points also increases the risk that outside agents could hack into company servers. It also degrades the quality of the internal wireless local area network system, subsequently potentially resulting in lost productivity.
A Threat is a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could violate security and cause harm. That is, a threat is a possible danger that might develop defencelessness. A threat can be either intentional (e.g., an individual cracker) or "accidental" (e.g., the possibility of a computer malfunctioning).
A virus is a small piece of software that piggybacks on real programs. A computer virus is a computer program that can reproduce and stretch from one computer to another. Viruses can increase their chances of dispersal to other computers by infecting files on a network file system or a file system that is accessed by other computers. The term "virus" is also normally, but incorrectly used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or inflict disaster.
Virus attack belongs to Malware Category. Programs in this category are generally considered to cause a significant security risk to the user's system and/or information. The actions taken by malicious programs can take range from stealing the user's confidential data, infecting the computer resulting in completely crashing the user's computer.
A compromised computer is one that has been hacked by a cracker, which is a person who breaks into a computer's systems with malicious intentions but it can also occur either through automation. A compromised system can be used to attack other systems and is generally considered a threat to all other systems connected to a network. Some may do this to send mass emails. Others may compromise a computer to steal personal information. A compromised system is more than just a hacked computer. Besides being a threat, a compromised system can also be a problem, exposing many types of sensitive data, such as:
• Social Security numbers (SSN)
• credit card numbers (CC)
• personal information, including passwords to a user’s bank account, e-mail and other online accounts
It is virtually impossible to determine the full scope of an attacker's reach into a compromised system, and the server should not be trusted for production use. It belongs to network threat.
Spam mail has different...
Please join StudyMode to read the full document