Preview

P1 Explain The Impact Of Different Types Of Threat To An Organisation

Good Essays
Open Document
Open Document
1232 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
P1 Explain The Impact Of Different Types Of Threat To An Organisation
P1: Explain the impact of different types of threat to an organisation
I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.
Malicious Damage:
Malicious damage occurs with most businesses, and they haven’t been easy to deal with either. There are at least 2 types of malicious that occur more often, they are worms and viruses, they both play a huge role when it comes to damaging a business
…show more content…
these products do sell very quickly as they can have the same functions as the real ones, and the price of these goods/products could either be higher than usually due to a significant amount of modifications. This would obviously be going against the law they would look very alike but the differences are there, between the real product and the fake product. Downloading illegal films, or even the process of finding one does not consume much type, as there are system such as peer to peer for people to share with. For example a film website showing films that are pretty much up to date is very illegal, although they get shutdown, there is so many different film websites being opened pretty much every hour, and so the law does its best to make sure it doesn’t happen but as you can see, I do not assume they are helping in a major way.
Human Errors:
This is when a problem occurs caused by a person that can simply affect organisations and very hard to spot out a human error before it becomes a bigger problem, these errors caused by a person or a couple of people are more challenging as they are hard to see and predict the time there would be sayings and quotes all over social media such as Instagram, that have many human errors, where there are actual planned and executed human errors, in other words the theory of the human errors are much
…show more content…
That is why most big businesses have hired individuals that do what hackers do, which is to find gaps or spaces in an organisations or a person’s security and report the problem or at least fix/repair the space before it gets into the hands of worse hackers, very similar as to what Uber has done recently, which was that they paid a couple of hackers to delete their own stolen data on 57 million people. This is against the law
Theft of Equipment:
This is a very common type of threat we see very frequently in our lifetimes, mostly by individuals. In terms of stolen data/ theft of data is done by hacking and the duration of their damage cannot be predicted for certain people or businesses. Things such as investment plans or architectural designs of a business can be spread over social media over the internet, competitors as well as business start-ups would be more than happy to know about this, and as you can imagine the damage of that cannot be predicted or estimate, when in relation to the period of that lasting damage.
Threats related to

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    Fourth, in the aftermath of the attack, the risks and threats that the company is exposed are further security breaches that could expose critical and private secret trading information of the company. This could lead to financial loses since hackers can…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    b.i. Examples of internal risks that may affect business are unauthorized access by individuals who are employed by the company, and those who aren’t employed by the company but still have access to individual store’s computer systems, applications, or areas where the servers and backup media are located. Other external and environmental risks include fire, floods, power outages, hardware failure, software glitches and failure, storms, and other acts of nature.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Estimated losses from malicious programs and viruses have been estimated in the billions of dollars. The costs come not only from theft of funds or information, but also the manpower and resources that it takes to find, track, and remove malicious programs, as well as replace programs or files damaged or removed. If you add in trust issues and loss of business from consumers because of data loss, the effects can be long lasting and even devastating to a business.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    While the effects of one of these attacks is realized at a much higher price for larger businesses, smaller companies are actually targeted more often because of their lack of security infrastructures and data monitoring systems. In fact Horton claims that more than 90% of data breaches affect small businesses. (Horton, 2014) These startling numbers leave many small business owners wondering what they can do to reduce the risk associated with cyber-attacks.…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    company’s sensitive data? Would you even consider hiring a hacker in the first place? Why or why not?…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    Threats to the system and information security can be things such as accidentally deleting a file and unauthorised access which may lead to theft of private details. Hackers and viruses also prove a huge threat to a system.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    According to the PowerPoint presentation “A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device, software, data, information, or processing capability.” Therefore, some examples of digital security risks include unauthorized access and use, malicious internet and network attacks, hardware theft, system failures, software theft, and information theft. Additionally, sources of digital security risk are hackers, crackers, script kiddies, corporate spies, unethical employees, cyber extortionists, and cyber…

    • 541 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    SEC 280 Week 4 Case Study

    • 425 Words
    • 2 Pages

    Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC571 tips

    • 460 Words
    • 2 Pages

    Phase I – Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Data Breach Research Paper

    • 4412 Words
    • 18 Pages

    References: Banham, R. (2012) “Where the Money Is, And the Security Isn’t: Cyber thieves are increasingly targeting small and midsize businesses, and why not? Most SMBs do little to protect themselves”. Retrieved from www.CFO.com…

    • 4412 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Computer Threats

    • 944 Words
    • 4 Pages

    My speech will be related to an important echo that face technology with is computer threats. I will cover some of important threats that face most of us; I will tell you how to protect your computer from threats, how to deal with hackers, crackers and what to do if your computer was attacked.…

    • 944 Words
    • 4 Pages
    Good Essays