100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Ensayo

P4 - Explain how an organisation can manage risk when using IT technology

Puntuación
4,0
(2)
Vendido
12
Páginas
5
Grado
P
Subido en
30-05-2017
Escrito en
2016/2017

Explain how an organization can manage risk when using IT technology. To achieve this expand on the following headings, using the on-line resources provided. • Cyber crime • Diverting financial assets • Sabotage of communications • Intellectual property theft • Denial of service attacks • Preventive technologies • Secure payment systems • Disaster recovery

Mostrar más Leer menos
Institución
Grado








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Nivel de Estudio
Editores
Tema
Curso

Información del documento

Subido en
30 de mayo de 2017
Número de páginas
5
Escrito en
2016/2017
Tipo
Ensayo
Profesor(es)
Desconocido
Grado
P

Temas

Vista previa del contenido

P4 – Explain how an organisation can manage risk when using IT technology

When there’s a problem, there’s a plan. There are so many risks in today’s technology that people are
specialised hired to ensure that a company or organisation are safe from these risks. Here are the ways
how.

Cyber Crime
The increase in developments in IT and the large use of the Internet reflects on how much cyber-crime
occurs. There have been many cases of fraud where consumers’ credit card details are stolen, despite the
chip and pin idea that was supposed to prevent this from happening. Hackers also have the ability to ‘break
into’ bank accounts and steal money by moving it to other bank accounts.
Crime can also occur in e-commerce too, in undesirable and illegal sites specifically found in the deep web.
It is a hard area for the law agencies to access and continues to be a problem today. Cyber security
administrators continue to combat these issues by ‘counter hacking’ to find culprits responsible for
damages, they could be external such as the Metropolitan Police Cyber Crime Unit who deals with general
cyber-crime in Greater London, then there are organisational security admins who ensure all devices are
kept safe within a company.

Diverting financial assets
Diverting financial assets is where an individual with malicious intentions gains access to a network within
which a computer where transactions occur on a regular basis, allowing for data to be stolen or for money
to be directed to different place, by using unencrypted data streams to edit the variables contained in any
instructional strings from the computer – this means that money can be transferred to different accounts.
Diverting financial assets can only be a huge risk if a business has very weak security on their local network
or router. This could mean using a free public Wi-Fi station or an easy password rather than a default WEP
password, a variation of letters and numbers jumbled up together and only you know the combination.
All of this, however, can be prevented by using secured payment systems like PayPal and Google Wallet.
These payments are run by other companies who have strong security and prevention methods, therefore
making it the best choice to prevent losing anything.

Sabotage of communications
Communication sabotage affects the use of telecommunications and email, meaning that either the
devices related would stop working or data would be transferred to another location that is not intended.
News of the World was involved in a phone hacking scandal where they leaked celebrity phone calls.
Instead of the information data being transmitted from one phone to another, it ended up with the news
company, meaning those celebrities had their privacy breached and phones sabotaged.
This form of sabotage can affect a business in many ways, for example if bank account details were sent
through e-mail, these could be exposed to hackers, and therefore the bank account could be accessed by
those outside a business. This is the same for telephone conversations; details can be obtained just by
listening to what are supposed to be confidential talks. With browser, you should ensure that the transfer
protocol is secured (https) and with e-mails there should be a secured socket layer.
4,28 €
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Reseñas de compradores verificados

Se muestran los 2 comentarios
3 año hace

8 año hace

It is well written and shows good points.

4,0

2 reseñas

5
0
4
2
3
0
2
0
1
0
Reseñas confiables sobre Stuvia

Todas las reseñas las realizan usuarios reales de Stuvia después de compras verificadas.

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
rapidhelp Pearson
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2539
Miembro desde
8 año
Número de seguidores
1938
Documentos
78
Última venta
2 año hace
Personal Folder of BTEC L3 IT Practitioners (Achived D*DD)

Former CANDI student studying Computer Forensics in Middlesex University. Achieved D*DD in BTEC L3 Extended Diploma in IT Practitioners. Work inspired by others and own research, only uploading theoretical documents. I\\\'d like to stress the fact that you should not completely copy the work, but use the provided work as a guide to what you need to write. If you have any queries, feedback, or anything else. Feel free to send me a message and I\\\'ll reply as soon as possible!

Lee mas Leer menos
3,3

65 reseñas

5
20
4
12
3
12
2
9
1
12

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes