100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary P1- Explain the different security Threats that can affect the IT systems of organisations. £16.99
Add to cart

Summary

Summary P1- Explain the different security Threats that can affect the IT systems of organisations.

 46 views  0 purchase

P1- Explain the different security Threats that can affect the IT systems of organisations.

Preview 2 out of 7  pages

  • January 20, 2023
  • 7
  • 2021/2022
  • Summary
  • baiting attacks
  • physical
All documents for this subject (38)
avatar-seller
businessopportunity
P1- Explain the different security
threats that can affect the IT
systems of organsiations.

Here are 4 types of Security threats.,

• Internal
• External
• Physical
• Social Engineering and Software threats



Software threats

Malware
This is an app which sets up destructive software in the system of user. Moreover,
Software detects activity of user and gather entire classified information of user. Here
are several kinds of malwares software shown below:

• Virus – virus produces a duplicate copy of itself that expand all over the files of
computer and doesn’t bring in notice of user. It enters the duplicated print of
itself into the different computer program occurs.
• Worm – Worms are related to viruses. Worm is a duplicate code which arrives
through emails that appear authorized.
• Trojan horse – Trojan horse is another type of malware that declares itself to be
original & misguide people of its actual purpose. Additionally, it works in the
background and tries to make an entrance into user’s system.
• Ransomware – Ransomware prevents access to the system of user and force them
to pay the price to reinstall the right to have access. In 2021, a city called
Baltimore was attacked by ransomware known as Robbin hood, it was
extremely powerful that it halted all the activities in the city which includes,
property transfers, tax collection and government emails for weeks. It was an
extremely expensive attack for the city as it coted them more than $18 millions.

, • Spyware – Spyware is the type of malware that get access to the system, steal
confidential information and the data about internet usage without bringing
these events into the user’s notice.
• Bonet - Bonet are also one of the malwares. They spread the infection all over
the network which is connected by many devices altogether. They are mainly
known and used for transferring spams
• Backdoors- backdoor is type of malware makes the normal authentication
procedures ineffective to get high-level access to a system.
• Bots- bots are type of a program that works according to the set of instructions
automatically. For example., automated replies, etc.

Phishing
Phishing is one of the cybercrimes in which people are targeted through emails,
phone calls by a stranger who acts like a legitimate institution to trick people so they
can gain access to classified information such as credit cards, debit cards and
passwords.

Here is the real-life example of phishing email attack. In December 2020, a phishing
attack occurred in USA at healthcare provider. In this attack attackers attacked two
employees. Furthermore, the attacker successfully managed to gain access to the
employees’ email accounts, in result they gained access to the personal details of
over 100,000 elderly patients and these personal details included names, birth, bank
and financial information, insurance information, social security numbers, driver’s
license numbers. This unauthorised access was maintained by attackers for a whole
week.

SQL Injection
SQL is one of the dangerous cybercrimes in which an attacker uses SQL code to
dominate a database of a website and get access to valuable information.

Here is the real-life example of SQL injection happened which is known as Ghost
Shell attack. In this attack hackers belonged to APT group team Ghost Shell aimed at
53 universities using SQL injection. In result, they stole and published personal
records around 36,000 to students, staff and faculty.

Man in the Middle (MITM) Attack
MITM attack occurs when two people are having a conversation and a third party
meaning third person, interferes into the conversation and gather sensitive,
potentially valuable information. For example., Public WIFI, a third person (hacker)

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller businessopportunity. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £16.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50843 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£16.99
  • (0)
Add to cart
Added