100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Essay

Organisational System Security Assignment 1

Rating
-
Sold
-
Pages
5
Grade
A
Uploaded on
07-05-2022
Written in
2017/2018

The document contains all criteria for assignment 1: P1, M1. I received full marks for this assignment.

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
May 7, 2022
Number of pages
5
Written in
2017/2018
Type
Essay
Professor(s)
Unknown
Grade
A

Subjects

Content preview

P1


Task 1


There are a few different threats that can affect an organisation and they can have different
impacts within that business. Many impacts may damage the reputation of the company
and make their customers lose trust in them.

Potential Threats
Human errors this can be very damaging to ITFix if wrong information was input
into the system; like medical records, another thing is if data was inputted for the
wrong person that also may cause confusion within the business and may cause
lack of trust with the customer. Also, another way human error may affect ITFix is
if someone accidentally deleted a lot of the files as they pressed the wrong button
or someone may have intentionally deleted files. Furthermore, they could prevent this from
happening by making sure that only specific employees have permissions to edit the data
and they could also make sure that multiple employees check the data after it has been
inputted to make sure that the details are correct. Finally, the manager of ITFix should
consider the point of confidentiality meaning who can view the data and who can edit that
data?
Technical failure, this can be a common problem within a
company where certain equipment fails as they may be old or
they are damaged on purpose by an angry employee. A problem
that may occur from technical failure is that documents may be
lost as they weren’t saved and this also means that the machine
could be prone to hackers attacking it to get information. Also, it
means that customers information could be in danger if the problem isn’t fixed straight
away which means that the company’s reputation will drop and the customers will lose their
trust in the company keeping their data secure.

Malicious Damage
Hackers, this is a very common threat on any business or individual. Hackers will
try and get into the system to steal data about certain people or they may go in
and corrupt certain data. A way that ITFix can stop hackers from getting in the
system is to have a secure network with every user having a login to be able to
access the system. Another way they can stop hackers is to have a secure
firewall and make sure that all the important files are encrypted by a password
and make sure that only certain individuals within the company can access those files. I
would recommend having a secure firewall on the server and to encrypt files that are
important.

, P1


Phishing, this is where someone tries to steal your personal
information like bank details and passwords. They can do this by
creating fake emails saying you have won competitions and then
when you click on the email to redeem your prize what happens is
the person phishing for your information then retrieves those
details and they then steal your money or other information. This
can be damaging on a company because it means that clients personal details are leaked
and people can find out whatever they need for that person. It also means that the
company could go out of business if it happens too many times as their reputation would be
ruined and no one would trust them.

E-commerce
Website defacement, a few hackers try to make fake websites to lure in
users to try and get their personal information. They do this by
making website that are either about an irrelevant topic or they
redirect users from a legitimate website. The way you can tell if a
website is fake is by looking at the Domain name and check the
spelling if there are spelling errors then you can tell it’s a fake
website, you can also check at the bottom of the webpage to see when
it was last updated and if it hasn’t been updated recently it can’t be trusted. Another way is
to check if the website is secure is if it doesn’t have “https” in the domain name then the
website isn’t as secure. To prevent any hackers getting your information be sure to check
that the domain name and if it is incorrect you should leave that website and delete all your
history and cookies within that browser. A way you can protect yourself from being hacked
through these websites is to make sure you have a firewall and that you have an up to date
antivirus software.
DDos Attacks, denial of service attacks these are where hackers sent a
lot of traffic to a website so that it makes the website temporarily go
down revealing a way in for the hackers to steal information from that
company. These attacks are normally done to either take down a
company so that they lose customers or so that the hacker can
retrieve information like personal details, bank details and a few other
files they may want. DDOS attacks on big companies are bad because it means that they
could lose important files or those files may be leaked to the public. Furthermore, I
recommend the way to prevent this from happening is to make sure to have a VPN and
make sure there is a secure firewall and no back entries that a DDos attack could take
advantage of.

Counterfeit Goods
Distribution networks, this is a system that a company uses to transport products between
a manufacturer and the consumer. It is also a fast and reliable way that a company can use
to distribute their products. Within the distribution network there is a lot of people ranging
from drivers to people working admin in the offices. However, if the distribution network is
$11.95
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
ItsKenzie
5.0
(9)

Also available in package deal

Get to know the seller

Seller avatar
ItsKenzie University
Follow You need to be logged in order to follow users or courses
Sold
20
Member since
6 year
Number of followers
10
Documents
78
Last sold
2 year ago
IT and Cyber Security Notes For Computing Students

I prepare and sell top quality notes and essays that are concise and easy to understand to fellow computing students. It can be overwhelming when you get your first few projects or assignments, using my notes and essays can help you to better understand the modules and hopefully help you get the grades you want. Thanks for visiting my profile, feedback is always appreciated.

5.0

9 reviews

5
9
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions