Preview

U07 Organisational systems security P1

Satisfactory Essays
Open Document
Open Document
521 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
U07 Organisational systems security P1
Pre-selection Task
P1

There are many threats to an organization, these include internal and external; virtual and physical threats. All of which can be tackled in some manner. Some are easier address then others.

Internal

Internal threats to an organization is a threat to an organization that roots from the organization its self. For example; employees, ex-employees and other people who may in in contact with the organization. These people may have access to confidential data that regards the security of the organization and the data it holds. These threats can put in to two categories these are virtual and physical.
Virtual threats consisted of theft of information, productivity loss, Data Corruption/Deletion and Malicious Code. Employees may have access to beneficial information; such as selling the data to others, using the data for themselves. This links with Data loss as data loss can be intentional my not just copying the information to a USB dive or emailing it can be completely removed. But if any data is deleted it’s not necessarily done in a malicious manner. As deletion can be occur as a result of human error. Although in July 2012 a report on the insider threat in the U.S. financial sector shows that 80% of malicious acts were committed at work during working hours. Productivity loss can occur when staff have become slack with their work or that is an issue within the work force causing work to progress slower. Such as a personal dispute between the workers.

External

External threats to an organization is a threat to an organization that roots from outside of the company. For example; vandalism, hackers, viruses and weather. The external threats are a lot harder to control and prevent then the internal threats. Just like the Internal threats; these can put in to two categories these are virtual and physical.
A hard threat to tackle is the threat of weather, weather conditions can be extreme and course damage to the company’s

You May Also Find These Documents Helpful

  • Good Essays

    I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Appendix D IT244

    • 827 Words
    • 4 Pages

    In terms of environmental risks that are external things such as earthquakes, fires, floods, mudslides, snow, ice, lightning, hurricanes, tornadoes, zombies, and killer bee’s etc., are considered. Internal Environmental risk factors could be human malicious intent, human error, utility issues (leaks), power outages, and equipment failures. With the new web servers and online shopping site Digital Crime will also be considered in all aspects internal and external Security.…

    • 827 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    o Threats – arise when conditions in the external environment endanger the integrity & profitability of the company’s business…

    • 1897 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    threats and opportunities that must be properly addressed in order to prepare the company for the…

    • 2750 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Separate societal (macro) and task (industry) level opportunities and threats into two categories and also identify which sub-category you feel a threat or opportunity falls into.…

    • 532 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Spam – for example when using a programme like Microsoft Outlook you have an address book with all saved email addresses, viruses etc. can gain access to these and use them to send spam emails to other via emails, the recipient is then at threat.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Threats) analysis would be applied to what this corporation may face in or near the…

    • 2625 Words
    • 19 Pages
    Better Essays
  • Good Essays

    As director of security for this company I will ensure a threat and vulnerability assessment to protect the company and remain profitable in business. In preparing to expand my security company in the Middle East and Africa there are several things that I must consider. Some of them are threats, threats of other security companies trying to buy me out, internet hacking, surveillance system, personnel, and how to secure the perimeter when a natural disaster strikes.…

    • 1473 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    You will learn how to match common risks or threats within the seven domains of a typical IT…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The main targets of this research were the current and former employees who had access to the information system, data or network with the degree of trust by the organization. Recent studies and surveys of cybercrime in both government and commercial sectors shows that current or former employees are the second greatest cyber crime threat. According to the 2007 e-Crime survey most insiders targeted proprietary information, include intellectual property, and customer and financial information. Many people argued that most threats can be easily prevented by “timely and effective action to address the anger, pain, anxiety, or psychological impairment of perpetrators who exhibit signs of vulnerability or risk well in advance of the crime of abuse.” This statement suggests that more research is needed on predictive indicators. But when it comes to predict who and when will commit an inside crime is still hard to predict. According to this research “currently, no single threat assessment technique gives a complete picture of the insider threat problem.” Many researcher suggests that a proactive approach must recognize possible precursors to insider threats behavior that are visible in employee behavior.…

    • 660 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Risk Assessment

    • 1788 Words
    • 8 Pages

    Almost every company in business is face with some risk or potential threat that could cause a huge blow to their organization operations. These risks and threats usually comes from within or outside and organization. In order to prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risk so they could protect themselves from the harm caused by them. Risks involve theoretical effectiveness of security measures, loss of impact, threats and vulnerabilities that are common in today's society.…

    • 1788 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Organizational Changes

    • 1162 Words
    • 5 Pages

    * The internal environment is affected by the organization's management policies and styles, systems, and procedures, as well as employee attitudes.…

    • 1162 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Hardware and software are key pieces of any organization’s infrastructure. Components in each domain of the seven domains of the IT infrastructure may connect to a network or to the internet, and can be vulnerable to malicious attacks. Malicious attacks on hardware and software can also lead to more widespread problems. These problems can include loss of critical data or theft of financial information or intellectual property. Unprotected IT and network infrastructure assets can offer attackers and cybercriminals the widest opening to access sensitive resources. The ease of access makes assets that are connected to the internet the most common first point of attack. That means those assets should be you first line of defense. Technical failure and human error are the most common causes of unintentional downtime. Malicious attacks can occur and cause downtime in all seven domains of an IT infrastructure, but you are more likely to see them in the User, Workstation, LAN, and WAN domains. Opportunity cost is the amount of money a company losses due to downtime. The downtime can be either intentional or unintentional. Some organizations refer to opportunity cost as true downtime cost. It usually measures the loss of productivity experienced by an organization due to downtime. One of the most important things that information security professionals try to protect is their organization’s reputation and brand image. Companies that suffer from security breaches and malicious attacks that expose any assets are likely to face serious negative consequences in the public eye. In the popular usage and in the media, the term hacker often describes someone who breaks into a computer system without authorization. In most cases that means the hacker tries to take control of a remote computer through a network, or software cracking. The media and the general public also use the word hacker to describe anyone accused of using technology for terrorism, vandalism, credit card fraud,…

    • 1126 Words
    • 5 Pages
    Good Essays