100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Ensayo

Unit 07 – Organisational Systems Security, Assignment 1: Understanding the impact of potential threats to IT systems

Puntuación
-
Vendido
-
Páginas
12
Grado
A+
Subido en
05-03-2023
Escrito en
2022/2023

Ensuring the security of computer systems and, crucially, the information they need is vital. Organisations and customers require confidence in these matters and security is critical to the successful deployment and use of IT. In this unit learners will consider physical security of computer systems from simple locks to complex biometric checks, as well as software-based security using, for example, passwords, access rights and encryption.

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Nivel de Estudio
Editores
Tema
Curso

Información del documento

Subido en
5 de marzo de 2023
Número de páginas
12
Escrito en
2022/2023
Tipo
Ensayo
Profesor(es)
Desconocido
Grado
A+

Temas

Vista previa del contenido

Unit 07 – Organisational Systems
Security
Assignment 1 - Understanding the impact of potential threats to IT systems



Different types of threat on an organisation.........................................................................................2
Potential threats................................................................................................................................2
Malicious damage..........................................................................................................................2
Treats related to e-commerce.......................................................................................................2
Counterfeit goods..........................................................................................................................2
Technical failures...........................................................................................................................3
Human error..................................................................................................................................3
Malicious damage:.............................................................................................................................3
Internal..........................................................................................................................................3
External..........................................................................................................................................3
Viruses...........................................................................................................................................3
Specific examples...............................................................................................................................4
Phishing.........................................................................................................................................4
Hacking..........................................................................................................................................4
Threats related to e-commerce.........................................................................................................5
Website defacement......................................................................................................................5
Control of access to data via third party suppliers.........................................................................5
Denial of service attacks................................................................................................................5
Counterfeit goods:.............................................................................................................................6
Product at risk................................................................................................................................6
Distribution mechanisms...................................................................................................................7
Organisational impact:.......................................................................................................................7
The importance of information security............................................................................................8
Reference:.......................................................................................................................................11




1

, Different types of threat on an organisation
Potential threats
Malicious damage
It is damage with causes destruction and harms to the system. It can be both externally and
internally. If it happened because malicious it is harming the people's reputation with
harmful information. It can be caused by physical or by a virus attack. To prevent it you must
use lighting bright security.
Malicious damage is when someone gains illegal access with the goal to corrupt or remove
electronic files, data, software programs, or digitally downloaded works of various musical
and cinematic genres. These activities are carried out for amusement or a specific objective.
Malicious harm can be caused by both internal and external access, access that causes
damage (like viruses), and access that does not cause damage, as well as other examples like
phishing, identity theft, and piggyback hacking. Malicious damage is when someone gains
illegal access with the goal to corrupt or remove electronic files, data, software programs, or
digitally downloaded works of various musical and cinematic genres. These activities are
carried out for fun or a specific goal.


Treats related to e-commerce
E-commerce is the buying and selling of CDs, DVDs, games, and other multimedia products,
the sale of digital downloads of various genres of music and movies using the Internet and
the transfer of money and data for the completion of these transactions. Customers choose
things online or in local stores across the country and pay for them with electronic
payments. After receiving payment, the seller ships the goods or provides the service.
Hackers and attackers can use this as an opportunity to access e-commerce since it is a
digital money transfer. It attacks the internet to crash security on a website to steal
payments or information It uses Dos attacks, Phishing emails, and others. To prevent it
always lock down cPanel and check correct permission. E-commerce sites use SSL
certificates to protect information. To detect it just check your information it is changed.
Always scan your websites and other online resources for malware, back up your data, and
have a dedicated security platform.
Counterfeit goods
It is a new product that is based on an existing original with infringement of intellectual
rights. It copies original product and sells it for its own gain. When trademarks are used
illegally to capitalize on their goodwill, counterfeiting is also a possibility. Fraudsters take
advantage of trademarks in an unfair and risky way by selling counterfeit items. The most
typical instances of counterfeit goods include products from various organisations, such as
software, games, and music.




2
$8.25
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
yar1

Conoce al vendedor

Seller avatar
yar1 College
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1
Miembro desde
2 año
Número de seguidores
1
Documentos
5
Última venta
2 año hace
Bruh

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes