Although computers have become IT systems are changing and
more reliable as time has pro- adapting before our very eyes. IMPACT OF
gressed, the complex nature of
the systems being used mean
While this has proven to be an
exciting time in human history
DIFFERENT TYPES
that technical failure will always as ideas are drawn up for OF THREAT ON AN
be a part of the equation. Having where we could take the tech-
a server shutdown or a storage nology next, it is also a danger- ORGANISATION
device become corrupted can ous time as hackers come up
cause considerable disruption to with new and destructive ideas
an induvial worker and the organ- to negatively impact our IT sys-
isation as a whole. Due to our in- tems. This leaflet will discuss
creased reliance on technology, the potential malicious threats
technical failure can cause exten- to a system and the impacts
sive damage to the security of an that these threats could have
IT system. on their organisations.
THEFT OF EQUIPMENT: COUNTERFEIT GOODS:
Thefts can occur digitally (via The trade and exchange of
hacking) or physically (USB with counterfeit goods has a two-
customers’ data being stolen). If fold impact in terms of its
an organisation’s equipment/data threat level. For one, it puts the
is stolen, the impacts of such an companies whose products are
act can be long-standing; con- being counterfeited (games,
sumer confidence can be lost, es- movies, music etc.) at risk of
pecially if it’s the customer’s data losing their primary source of
that’s been stolen. income. It also puts the recipi- George Mizen
ent who is buying the counter-
HUMAN ERROR: feited goods at risk of breaking BTEC Level 3 ICT, Year 2
This is the most common security the law, which if caught could Unit 7
threat in any IT system. Being result in a heavy fine.
forgetful, ignorant or just having SOURCES:
a lack of knowledge on how to
operate a system correctly can IMAGE = Cyber Threat Title Page
cause security breaches that neg- IMAGE = Counterfeit Goods Sign
atively impact the entire system.
Port Scanning Info
Man In The Middle Info
Magic Disk Tactics Info
Key Logging Info