100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

Unit 7 - IT Systems Security and Encryption

Rating
1.0
(1)
Sold
1
Pages
19
Grade
A+
Uploaded on
16-10-2024
Written in
2023/2024

A Report on IT Security Threats and Cryptography for IT Systems Security & Encryption Assignment 1 Distinction grade achieved DISCLAIMER: Do not copy & paste as document has been uploaded to Turnitin











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
October 16, 2024
Number of pages
19
Written in
2023/2024
Type
Essay
Professor(s)
Unknown
Grade
A+

Content preview

Report on IT Security Threats
and Cryptography for Toy and
Model Company
Contents
Introduction...........................................................................................................................................2
Current IT Security Threats....................................................................................................................2
Threat Types......................................................................................................................................3
Internal Threats.............................................................................................................................3
External Threats.............................................................................................................................5
Physical Threats.............................................................................................................................5
Social Engineering and Software-Driven Threats...........................................................................7
Techniques Used to Obtain Secure Information............................................................................8
Computer Based Threats...................................................................................................................9
Passive Threats..............................................................................................................................9
Active Threats..............................................................................................................................10
Cloud Computing Security Risks...................................................................................................11
Principles of Information Security.......................................................................................................11
Principles of Confidentiality, Integrity, and Availability...................................................................11
Confidentiality:............................................................................................................................11
Integrity:......................................................................................................................................12
Availability...................................................................................................................................12
Accessibility of Information.............................................................................................................12
Unauthorised Access or Modification..............................................................................................12
Principle of Minimal Access.............................................................................................................13
Deliberate or Accidental Loss of Information..................................................................................13
Legal Requirements for IT Security......................................................................................................13
Data Protection Act 1998.................................................................................................................13
Computer Misuse Act 1990.............................................................................................................13
Copyright, Designs and Patents Act 1988........................................................................................13
Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations
2000.................................................................................................................................................14
Fraud Act 2006.................................................................................................................................14

,Impact of IT Security Threats on Organisations...................................................................................14
Operational Impact of Loss of Data or Service.................................................................................14
Financial Impact of Loss of Service (E-commerce Website).............................................................14
Damage to Reputation.....................................................................................................................14
Legal Consequences of Data Privacy Breaches................................................................................15
Evaluation of Security Techniques.......................................................................................................15
Cryptography and Data Security..........................................................................................................16
Uses of Cryptography......................................................................................................................16
Shift Ciphers:................................................................................................................................16
One-Time Pads:............................................................................................................................16
Hash Functions (e.g. MD4, MD5, SHA-2, SHA-3):.........................................................................16
Block Ciphers:..............................................................................................................................16
Stream Ciphers:...........................................................................................................................17
Cryptographic Primitives (e.g. Pseudo-random Functions, One-way Functions):........................17
Cryptographic Salts:.....................................................................................................................17
Encryption Algorithms (e.g. RSA, DES, 3DES):..............................................................................17
Legal and Ethical issues and considerations that are impacted by cryptography................................17
Privacy and Data Protection Laws:...................................................................................................17
Intellectual Property Rights:............................................................................................................17
Government Surveillance and Individual Rights:.............................................................................18
Cybersecurity Regulations:..............................................................................................................18
Principles of Cryptography...................................................................................................................18
Conclusion...........................................................................................................................................18
References:..........................................................................................................................................19



Introduction

IT Security is extremely important nowadays, especially for a start-up company that designs and sells
toys and models online and locally. Many security threats target businesses and this report aims to
showcase and report on different parts of IT security and threats. This is important as understanding
this can help with combatting these security threats and help with bringing good encryption or
safeguarding to the IT systems of the business.



Current IT Security Threats

, Threat Types
There are a few IT Security threats that are used by malicious people today. These include Internal
threats, External threats, Physical Threats, Social engineering, and Software-driven threats. These
threats are continuously evolving, so companies need to constantly keep watch on them to make
sure they do not affect the business.

Internal Threats
Employees of the business may deliberately or accidentally cause a threat. There could be human
error or lack of awareness where employees may expose the organisation to risks without knowing.
Employees that are upset for any reason may also intentionally steal sensitive information or
compromise the systems and some employees may abuse their access and sell sensitive information
through insider trading.

Employees may also end up becoming a victim of phishing attacks where attackers make them reveal
their login information through scam emails which will let the attackers gain unauthorised access to
their systems.

Employees can also get manipulated by other malicious employees into revealing sensitive
information or doing things that are a risk to the security of the business.
£16.65
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
shaquille2005
1.0
(1)

Reviews from verified buyers

Showing all reviews
8 months ago

1.0

1 reviews

5
0
4
0
3
0
2
0
1
1
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
shaquille2005 New city
View profile
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
1 year
Number of followers
1
Documents
3
Last sold
8 months ago

1.0

1 reviews

5
0
4
0
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions