100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Essay

P4 - Explain how an organisation can manage risk when using IT technology

Rating
4.0
(2)
Sold
12
Pages
5
Grade
P
Uploaded on
30-05-2017
Written in
2016/2017

Explain how an organization can manage risk when using IT technology. To achieve this expand on the following headings, using the on-line resources provided. • Cyber crime • Diverting financial assets • Sabotage of communications • Intellectual property theft • Denial of service attacks • Preventive technologies • Secure payment systems • Disaster recovery

Show more Read less
Institution
Course








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
May 30, 2017
Number of pages
5
Written in
2016/2017
Type
Essay
Professor(s)
Unknown
Grade
P

Subjects

Content preview

P4 – Explain how an organisation can manage risk when using IT technology

When there’s a problem, there’s a plan. There are so many risks in today’s technology that people are
specialised hired to ensure that a company or organisation are safe from these risks. Here are the ways
how.

Cyber Crime
The increase in developments in IT and the large use of the Internet reflects on how much cyber-crime
occurs. There have been many cases of fraud where consumers’ credit card details are stolen, despite the
chip and pin idea that was supposed to prevent this from happening. Hackers also have the ability to ‘break
into’ bank accounts and steal money by moving it to other bank accounts.
Crime can also occur in e-commerce too, in undesirable and illegal sites specifically found in the deep web.
It is a hard area for the law agencies to access and continues to be a problem today. Cyber security
administrators continue to combat these issues by ‘counter hacking’ to find culprits responsible for
damages, they could be external such as the Metropolitan Police Cyber Crime Unit who deals with general
cyber-crime in Greater London, then there are organisational security admins who ensure all devices are
kept safe within a company.

Diverting financial assets
Diverting financial assets is where an individual with malicious intentions gains access to a network within
which a computer where transactions occur on a regular basis, allowing for data to be stolen or for money
to be directed to different place, by using unencrypted data streams to edit the variables contained in any
instructional strings from the computer – this means that money can be transferred to different accounts.
Diverting financial assets can only be a huge risk if a business has very weak security on their local network
or router. This could mean using a free public Wi-Fi station or an easy password rather than a default WEP
password, a variation of letters and numbers jumbled up together and only you know the combination.
All of this, however, can be prevented by using secured payment systems like PayPal and Google Wallet.
These payments are run by other companies who have strong security and prevention methods, therefore
making it the best choice to prevent losing anything.

Sabotage of communications
Communication sabotage affects the use of telecommunications and email, meaning that either the
devices related would stop working or data would be transferred to another location that is not intended.
News of the World was involved in a phone hacking scandal where they leaked celebrity phone calls.
Instead of the information data being transmitted from one phone to another, it ended up with the news
company, meaning those celebrities had their privacy breached and phones sabotaged.
This form of sabotage can affect a business in many ways, for example if bank account details were sent
through e-mail, these could be exposed to hackers, and therefore the bank account could be accessed by
those outside a business. This is the same for telephone conversations; details can be obtained just by
listening to what are supposed to be confidential talks. With browser, you should ensure that the transfer
protocol is secured (https) and with e-mails there should be a secured socket layer.

Reviews from verified buyers

Showing all 2 reviews
3 year ago

8 year ago

It is well written and shows good points.

4.0

2 reviews

5
0
4
2
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
rapidhelp Pearson
Follow You need to be logged in order to follow users or courses
Sold
2539
Member since
8 year
Number of followers
1938
Documents
78
Last sold
2 year ago
Personal Folder of BTEC L3 IT Practitioners (Achived D*DD)

Former CANDI student studying Computer Forensics in Middlesex University. Achieved D*DD in BTEC L3 Extended Diploma in IT Practitioners. Work inspired by others and own research, only uploading theoretical documents. I\\\'d like to stress the fact that you should not completely copy the work, but use the provided work as a guide to what you need to write. If you have any queries, feedback, or anything else. Feel free to send me a message and I\\\'ll reply as soon as possible!

Read more Read less
3.3

65 reviews

5
20
4
12
3
12
2
9
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions