Unit 07 – Organisational Systems Security, Assignment 1: Understanding the impact of potential threats to IT systems
1 view 0 purchase
Course
Unit 7 - Organisational Systems Security, Ass - 1
Institution
PEARSON (PEARSON)
Ensuring the security of computer systems and, crucially, the information they need is vital. Organisations and customers require confidence in these matters and security is critical to the successful deployment and use of IT. In this unit learners will consider physical security of computer system...
assignment 1 understanding the impact of potential threats to it systems
assignment
Written for
BTEC
PEARSON (PEARSON)
Digital Technologies
Unit 7 - Organisational Systems Security, Ass - 1
All documents for this subject (1)
Seller
Follow
yar1
Content preview
Unit 07 – Organisational Systems
Security
Assignment 1 - Understanding the impact of potential threats to IT systems
Different types of threat on an organisation.........................................................................................2
Potential threats................................................................................................................................2
Malicious damage..........................................................................................................................2
Treats related to e-commerce.......................................................................................................2
Counterfeit goods..........................................................................................................................2
Technical failures...........................................................................................................................3
Human error..................................................................................................................................3
Malicious damage:.............................................................................................................................3
Internal..........................................................................................................................................3
External..........................................................................................................................................3
Viruses...........................................................................................................................................3
Specific examples...............................................................................................................................4
Phishing.........................................................................................................................................4
Hacking..........................................................................................................................................4
Threats related to e-commerce.........................................................................................................5
Website defacement......................................................................................................................5
Control of access to data via third party suppliers.........................................................................5
Denial of service attacks................................................................................................................5
Counterfeit goods:.............................................................................................................................6
Product at risk................................................................................................................................6
Distribution mechanisms...................................................................................................................7
Organisational impact:.......................................................................................................................7
The importance of information security............................................................................................8
Reference:.......................................................................................................................................11
1
, Different types of threat on an organisation
Potential threats
Malicious damage
It is damage with causes destruction and harms to the system. It can be both externally and
internally. If it happened because malicious it is harming the people's reputation with
harmful information. It can be caused by physical or by a virus attack. To prevent it you must
use lighting bright security.
Malicious damage is when someone gains illegal access with the goal to corrupt or remove
electronic files, data, software programs, or digitally downloaded works of various musical
and cinematic genres. These activities are carried out for amusement or a specific objective.
Malicious harm can be caused by both internal and external access, access that causes
damage (like viruses), and access that does not cause damage, as well as other examples like
phishing, identity theft, and piggyback hacking. Malicious damage is when someone gains
illegal access with the goal to corrupt or remove electronic files, data, software programs, or
digitally downloaded works of various musical and cinematic genres. These activities are
carried out for fun or a specific goal.
Treats related to e-commerce
E-commerce is the buying and selling of CDs, DVDs, games, and other multimedia products,
the sale of digital downloads of various genres of music and movies using the Internet and
the transfer of money and data for the completion of these transactions. Customers choose
things online or in local stores across the country and pay for them with electronic
payments. After receiving payment, the seller ships the goods or provides the service.
Hackers and attackers can use this as an opportunity to access e-commerce since it is a
digital money transfer. It attacks the internet to crash security on a website to steal
payments or information It uses Dos attacks, Phishing emails, and others. To prevent it
always lock down cPanel and check correct permission. E-commerce sites use SSL
certificates to protect information. To detect it just check your information it is changed.
Always scan your websites and other online resources for malware, back up your data, and
have a dedicated security platform.
Counterfeit goods
It is a new product that is based on an existing original with infringement of intellectual
rights. It copies original product and sells it for its own gain. When trademarks are used
illegally to capitalize on their goodwill, counterfeiting is also a possibility. Fraudsters take
advantage of trademarks in an unfair and risky way by selling counterfeit items. The most
typical instances of counterfeit goods include products from various organisations, such as
software, games, and music.
2
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller yar1. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.73. You're not tied to anything after your purchase.