100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary P1- Explain the different security Threats that can affect the IT systems of organisations.

Rating
-
Sold
-
Pages
7
Uploaded on
20-01-2023
Written in
2021/2022

P1- Explain the different security Threats that can affect the IT systems of organisations.










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
January 20, 2023
Number of pages
7
Written in
2021/2022
Type
Summary

Subjects

  • baiting attacks
  • physical

Content preview

P1- Explain the different security
threats that can affect the IT
systems of organsiations.

Here are 4 types of Security threats.,

• Internal
• External
• Physical
• Social Engineering and Software threats



Software threats

Malware
This is an app which sets up destructive software in the system of user. Moreover,
Software detects activity of user and gather entire classified information of user. Here
are several kinds of malwares software shown below:

• Virus – virus produces a duplicate copy of itself that expand all over the files of
computer and doesn’t bring in notice of user. It enters the duplicated print of
itself into the different computer program occurs.
• Worm – Worms are related to viruses. Worm is a duplicate code which arrives
through emails that appear authorized.
• Trojan horse – Trojan horse is another type of malware that declares itself to be
original & misguide people of its actual purpose. Additionally, it works in the
background and tries to make an entrance into user’s system.
• Ransomware – Ransomware prevents access to the system of user and force them
to pay the price to reinstall the right to have access. In 2021, a city called
Baltimore was attacked by ransomware known as Robbin hood, it was
extremely powerful that it halted all the activities in the city which includes,
property transfers, tax collection and government emails for weeks. It was an
extremely expensive attack for the city as it coted them more than $18 millions.

, • Spyware – Spyware is the type of malware that get access to the system, steal
confidential information and the data about internet usage without bringing
these events into the user’s notice.
• Bonet - Bonet are also one of the malwares. They spread the infection all over
the network which is connected by many devices altogether. They are mainly
known and used for transferring spams
• Backdoors- backdoor is type of malware makes the normal authentication
procedures ineffective to get high-level access to a system.
• Bots- bots are type of a program that works according to the set of instructions
automatically. For example., automated replies, etc.

Phishing
Phishing is one of the cybercrimes in which people are targeted through emails,
phone calls by a stranger who acts like a legitimate institution to trick people so they
can gain access to classified information such as credit cards, debit cards and
passwords.

Here is the real-life example of phishing email attack. In December 2020, a phishing
attack occurred in USA at healthcare provider. In this attack attackers attacked two
employees. Furthermore, the attacker successfully managed to gain access to the
employees’ email accounts, in result they gained access to the personal details of
over 100,000 elderly patients and these personal details included names, birth, bank
and financial information, insurance information, social security numbers, driver’s
license numbers. This unauthorised access was maintained by attackers for a whole
week.

SQL Injection
SQL is one of the dangerous cybercrimes in which an attacker uses SQL code to
dominate a database of a website and get access to valuable information.

Here is the real-life example of SQL injection happened which is known as Ghost
Shell attack. In this attack hackers belonged to APT group team Ghost Shell aimed at
53 universities using SQL injection. In result, they stole and published personal
records around 36,000 to students, staff and faculty.

Man in the Middle (MITM) Attack
MITM attack occurs when two people are having a conversation and a third party
meaning third person, interferes into the conversation and gather sensitive,
potentially valuable information. For example., Public WIFI, a third person (hacker)

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
businessopportunity Uxbridge College (London)
View profile
Follow You need to be logged in order to follow users or courses
Sold
16
Member since
3 year
Number of followers
12
Documents
17
Last sold
11 months ago

4.5

6 reviews

5
4
4
1
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions