Task 1: Create a leaflet which explains the following threats on organisation:
1. Potential threats:
i. malicious damage;
ii. Threats related to e-commerce;
iii. Counterfeit goods;
iv. Technical failures eg human error, theft of equipment
2. Malicious damage:
i. Access causing damage eg virus...
P1 – Explain the impact of different types of threat on an organisation
M1 – Discuss information security
Potential threats
Malicious damage – Malicious damage is when a person intentionally sets out to corrupt or delete
electronic files, data or software programs. The most common way is internally, which focuses in the
organisation system. If an employee were to open and download files from an infected e-mail, it will
spread across the rest of the network and affect the rest of the company.
Threats related to e-commerce – Threats on e-commerce can be very stressful for both the company
and the public as e-commerce is all about advertising goods. If advertising and selling is being affected,
it can cause a big impact on buying and selling.
Counterfeit goods – Counterfeit goods are the fake replicas of genuine merchandise. Counterfeit
criminals can create products that almost replace the real thing in the hopes of tricking a buyer into
paying a high price for a fake item. This can be generally known as a scam. It is a major problem for
companies and organisations as it affects them the most. There is counterfeit software out there which
is made for the purpose of harming a computer system and take personal details. Software companies
such as Microsoft have suffered heavily on this.
‘Technical failures’ – A technical failure is an unwanted and unnecessary error of technology based
systems.
Human error – Human error is the most inappropriate way for a company to feel threatened. It is
the input of false data into a computer done by a person. The data is incorrect, misleading or
irrelevant. It doesn’t have to just be data; it can be something reckless such as forgetting to
perform system security maintenance, allowing the network to be vulnerable to attack!
Theft – Theft of equipment is just an inconvenient threat to the company. Having equipment stolen
can be a problem as they’ll need to use their budget to replace it and they’ll need that equipment
back quickly. They may have stolen something important that could potentially halt the company’s
performance. This is why physical security is required as well as software security.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller rapidhelp. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $4.95. You're not tied to anything after your purchase.