100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Ensayo

Unit 7 - IT Systems Security and Encryption

Puntuación
1.0
(1)
Vendido
1
Páginas
19
Grado
A+
Subido en
16-10-2024
Escrito en
2023/2024

A Report on IT Security Threats and Cryptography for IT Systems Security & Encryption Assignment 1 Distinction grade achieved DISCLAIMER: Do not copy & paste as document has been uploaded to Turnitin

Institución
Grado










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Nivel de Estudio
Editores
Tema
Curso

Información del documento

Subido en
16 de octubre de 2024
Número de páginas
19
Escrito en
2023/2024
Tipo
Ensayo
Profesor(es)
Desconocido
Grado
A+

Temas

Vista previa del contenido

Report on IT Security Threats
and Cryptography for Toy and
Model Company
Contents
Introduction...........................................................................................................................................2
Current IT Security Threats....................................................................................................................2
Threat Types......................................................................................................................................3
Internal Threats.............................................................................................................................3
External Threats.............................................................................................................................5
Physical Threats.............................................................................................................................5
Social Engineering and Software-Driven Threats...........................................................................7
Techniques Used to Obtain Secure Information............................................................................8
Computer Based Threats...................................................................................................................9
Passive Threats..............................................................................................................................9
Active Threats..............................................................................................................................10
Cloud Computing Security Risks...................................................................................................11
Principles of Information Security.......................................................................................................11
Principles of Confidentiality, Integrity, and Availability...................................................................11
Confidentiality:............................................................................................................................11
Integrity:......................................................................................................................................12
Availability...................................................................................................................................12
Accessibility of Information.............................................................................................................12
Unauthorised Access or Modification..............................................................................................12
Principle of Minimal Access.............................................................................................................13
Deliberate or Accidental Loss of Information..................................................................................13
Legal Requirements for IT Security......................................................................................................13
Data Protection Act 1998.................................................................................................................13
Computer Misuse Act 1990.............................................................................................................13
Copyright, Designs and Patents Act 1988........................................................................................13
Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations
2000.................................................................................................................................................14
Fraud Act 2006.................................................................................................................................14

,Impact of IT Security Threats on Organisations...................................................................................14
Operational Impact of Loss of Data or Service.................................................................................14
Financial Impact of Loss of Service (E-commerce Website).............................................................14
Damage to Reputation.....................................................................................................................14
Legal Consequences of Data Privacy Breaches................................................................................15
Evaluation of Security Techniques.......................................................................................................15
Cryptography and Data Security..........................................................................................................16
Uses of Cryptography......................................................................................................................16
Shift Ciphers:................................................................................................................................16
One-Time Pads:............................................................................................................................16
Hash Functions (e.g. MD4, MD5, SHA-2, SHA-3):.........................................................................16
Block Ciphers:..............................................................................................................................16
Stream Ciphers:...........................................................................................................................17
Cryptographic Primitives (e.g. Pseudo-random Functions, One-way Functions):........................17
Cryptographic Salts:.....................................................................................................................17
Encryption Algorithms (e.g. RSA, DES, 3DES):..............................................................................17
Legal and Ethical issues and considerations that are impacted by cryptography................................17
Privacy and Data Protection Laws:...................................................................................................17
Intellectual Property Rights:............................................................................................................17
Government Surveillance and Individual Rights:.............................................................................18
Cybersecurity Regulations:..............................................................................................................18
Principles of Cryptography...................................................................................................................18
Conclusion...........................................................................................................................................18
References:..........................................................................................................................................19



Introduction

IT Security is extremely important nowadays, especially for a start-up company that designs and sells
toys and models online and locally. Many security threats target businesses and this report aims to
showcase and report on different parts of IT security and threats. This is important as understanding
this can help with combatting these security threats and help with bringing good encryption or
safeguarding to the IT systems of the business.



Current IT Security Threats

, Threat Types
There are a few IT Security threats that are used by malicious people today. These include Internal
threats, External threats, Physical Threats, Social engineering, and Software-driven threats. These
threats are continuously evolving, so companies need to constantly keep watch on them to make
sure they do not affect the business.

Internal Threats
Employees of the business may deliberately or accidentally cause a threat. There could be human
error or lack of awareness where employees may expose the organisation to risks without knowing.
Employees that are upset for any reason may also intentionally steal sensitive information or
compromise the systems and some employees may abuse their access and sell sensitive information
through insider trading.

Employees may also end up becoming a victim of phishing attacks where attackers make them reveal
their login information through scam emails which will let the attackers gain unauthorised access to
their systems.

Employees can also get manipulated by other malicious employees into revealing sensitive
information or doing things that are a risk to the security of the business.
$24.15
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
shaquille2005
1.0
(1)

Reseñas de compradores verificados

Se muestran los comentarios
9 meses hace

1.0

1 reseñas

5
0
4
0
3
0
2
0
1
1
Reseñas confiables sobre Stuvia

Todas las reseñas las realizan usuarios reales de Stuvia después de compras verificadas.

Conoce al vendedor

Seller avatar
shaquille2005 New city
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2
Miembro desde
1 año
Número de seguidores
1
Documentos
3
Última venta
10 meses hace

1.0

1 reseñas

5
0
4
0
3
0
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes