100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

KNOWLEDGE

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
27-04-2021
Written in
2021/2022

My document/assignment explains different aspects of viruses and how we can protect our system and prevent identity thieves from stealing our details.

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
April 27, 2021
Number of pages
10
Written in
2021/2022
Type
Essay
Professor(s)
Unknown
Grade
A+

Subjects

Content preview

Mohammed Hussain


P1- Explain the impact of several types of threats to an
organisation.

Brief
In this report, will be pinpointing and discussing the various threats to an organisations.
As explained in the assignment scenario. I’m also going to explain differences between
security threats and principles when protecting the IT systems of organisations




Developing a money bank transfer software is one of the ways to attract cyber
attackers. And the one the biggest threats to online banking are identity theft.
Online banks are known to have good security measures to protect your
information. But once you have your account made online, your information is
at risk from hackers. Computer criminals are always working to bypass existing
security systems, and if your information or your details are being held on a
bank’s server then they could be at risk of theft, as well as your social security
number which is also associated with your account is at risk too.

Another big threat to IT systems is Phishing. Phishing is when a cyber attacker
sends out emails to people with fake links trying to get those people to click on
the links giving aware their personal information. When you set up an online
bank account, you may get one of these emails. If you click on the fake link that
has been sent to you by a criminal, it will take you to a website that looks and
acts like your bank’s login page. The page was set up to steal your login
information and within minutes of having your login information, the attacker
will log in to your account and start stealing your money and your personal
information.

There are many threats to IT systems which can be a chaos for organisations
such as, computer viruses, adware, spyware, DOS attacks which stand for
denial-of-services, malware etc.

A computer virus is a software program that, without the user’s knowledge,
can spread from one computer to another computer or one network to
another network and carry out malicious attacks. It has the potential to corrupt
or harm confidential data from organisations, kill files, and format hard drives.


An Adware is a software application that provides commercial and marketing-
related ads such as pop-up windows or bars showing advertisements, banner

, Mohammed Hussain


advertisements, video on your computer screen. The main aim is to produce
revenue by providing various forms of advertising to an internet user for its
creator.

Spyware is an unwanted type of security threat to organisations installed on
the computer of the user and gathers confidential information without user
knowledge, such as personal or business information of the company, login
credentials and credit
card data.

WORM is a type of
malicious software or
program that spreads
from one machine to
another computer of an
organisation within its
linked network and
copies itself.

DOS which stands for
DENIAL-OF-SERVICE, is an attack to shut down networks and systems to users.
It usually floods a targeted device with requests until it is unable to handle
normal traffic, resulting in users being denied service.

Malware is a software that is usually created by cyber criminals and consists of
software or code. There are forms of cyber security threats to organisations
that are designed to destroy networks extensively or to obtain unauthorised
access to a device.
How does Malware attack??
There are various ways in which a malware can infect a computer, such as
delivering it via email in the form of a link or file and clicking on the link or
opening the file is needed by the user to run the malware.

Computer viruses, worms, trojan horses and spyware are included in this form
of attack.
$83.22
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
mohammedhussain3

Get to know the seller

Seller avatar
mohammedhussain3 Bedford College
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
4 year
Number of followers
0
Documents
2
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions