100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
KNOWLEDGE $78.07   Add to cart

Essay

KNOWLEDGE

 69 views  0 purchase
  • Course
  • Institution

My document/assignment explains different aspects of viruses and how we can protect our system and prevent identity thieves from stealing our details.

Preview 2 out of 10  pages

  • April 27, 2021
  • 10
  • 2021/2022
  • Essay
  • Unknown
  • A+
avatar-seller
Mohammed Hussain


P1- Explain the impact of several types of threats to an
organisation.

Brief
In this report, will be pinpointing and discussing the various threats to an organisations.
As explained in the assignment scenario. I’m also going to explain differences between
security threats and principles when protecting the IT systems of organisations




Developing a money bank transfer software is one of the ways to attract cyber
attackers. And the one the biggest threats to online banking are identity theft.
Online banks are known to have good security measures to protect your
information. But once you have your account made online, your information is
at risk from hackers. Computer criminals are always working to bypass existing
security systems, and if your information or your details are being held on a
bank’s server then they could be at risk of theft, as well as your social security
number which is also associated with your account is at risk too.

Another big threat to IT systems is Phishing. Phishing is when a cyber attacker
sends out emails to people with fake links trying to get those people to click on
the links giving aware their personal information. When you set up an online
bank account, you may get one of these emails. If you click on the fake link that
has been sent to you by a criminal, it will take you to a website that looks and
acts like your bank’s login page. The page was set up to steal your login
information and within minutes of having your login information, the attacker
will log in to your account and start stealing your money and your personal
information.

There are many threats to IT systems which can be a chaos for organisations
such as, computer viruses, adware, spyware, DOS attacks which stand for
denial-of-services, malware etc.

A computer virus is a software program that, without the user’s knowledge,
can spread from one computer to another computer or one network to
another network and carry out malicious attacks. It has the potential to corrupt
or harm confidential data from organisations, kill files, and format hard drives.


An Adware is a software application that provides commercial and marketing-
related ads such as pop-up windows or bars showing advertisements, banner

, Mohammed Hussain


advertisements, video on your computer screen. The main aim is to produce
revenue by providing various forms of advertising to an internet user for its
creator.

Spyware is an unwanted type of security threat to organisations installed on
the computer of the user and gathers confidential information without user
knowledge, such as personal or business information of the company, login
credentials and credit
card data.

WORM is a type of
malicious software or
program that spreads
from one machine to
another computer of an
organisation within its
linked network and
copies itself.

DOS which stands for
DENIAL-OF-SERVICE, is an attack to shut down networks and systems to users.
It usually floods a targeted device with requests until it is unable to handle
normal traffic, resulting in users being denied service.

Malware is a software that is usually created by cyber criminals and consists of
software or code. There are forms of cyber security threats to organisations
that are designed to destroy networks extensively or to obtain unauthorised
access to a device.
How does Malware attack??
There are various ways in which a malware can infect a computer, such as
delivering it via email in the form of a link or file and clicking on the link or
opening the file is needed by the user to run the malware.

Computer viruses, worms, trojan horses and spyware are included in this form
of attack.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller mohammedhussain3. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $78.07. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67474 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$78.07
  • (0)
  Add to cart