Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Dissertation

P4 - Explain how an organisation can manage risk when using IT technology

Vendu
12
Pages
5
Grade
P
Publié le
30-05-2017
Écrit en
2016/2017

Explain how an organization can manage risk when using IT technology. To achieve this expand on the following headings, using the on-line resources provided. • Cyber crime • Diverting financial assets • Sabotage of communications • Intellectual property theft • Denial of service attacks • Preventive technologies • Secure payment systems • Disaster recovery

Montrer plus Lire moins
Établissement
Cours








Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Niveau d'études
Editeur
Sujet
Cours

Infos sur le Document

Publié le
30 mai 2017
Nombre de pages
5
Écrit en
2016/2017
Type
Dissertation
Professeur(s)
Inconnu
Grade
P

Sujets

Aperçu du contenu

P4 – Explain how an organisation can manage risk when using IT technology

When there’s a problem, there’s a plan. There are so many risks in today’s technology that people are
specialised hired to ensure that a company or organisation are safe from these risks. Here are the ways
how.

Cyber Crime
The increase in developments in IT and the large use of the Internet reflects on how much cyber-crime
occurs. There have been many cases of fraud where consumers’ credit card details are stolen, despite the
chip and pin idea that was supposed to prevent this from happening. Hackers also have the ability to ‘break
into’ bank accounts and steal money by moving it to other bank accounts.
Crime can also occur in e-commerce too, in undesirable and illegal sites specifically found in the deep web.
It is a hard area for the law agencies to access and continues to be a problem today. Cyber security
administrators continue to combat these issues by ‘counter hacking’ to find culprits responsible for
damages, they could be external such as the Metropolitan Police Cyber Crime Unit who deals with general
cyber-crime in Greater London, then there are organisational security admins who ensure all devices are
kept safe within a company.

Diverting financial assets
Diverting financial assets is where an individual with malicious intentions gains access to a network within
which a computer where transactions occur on a regular basis, allowing for data to be stolen or for money
to be directed to different place, by using unencrypted data streams to edit the variables contained in any
instructional strings from the computer – this means that money can be transferred to different accounts.
Diverting financial assets can only be a huge risk if a business has very weak security on their local network
or router. This could mean using a free public Wi-Fi station or an easy password rather than a default WEP
password, a variation of letters and numbers jumbled up together and only you know the combination.
All of this, however, can be prevented by using secured payment systems like PayPal and Google Wallet.
These payments are run by other companies who have strong security and prevention methods, therefore
making it the best choice to prevent losing anything.

Sabotage of communications
Communication sabotage affects the use of telecommunications and email, meaning that either the
devices related would stop working or data would be transferred to another location that is not intended.
News of the World was involved in a phone hacking scandal where they leaked celebrity phone calls.
Instead of the information data being transmitted from one phone to another, it ended up with the news
company, meaning those celebrities had their privacy breached and phones sabotaged.
This form of sabotage can affect a business in many ways, for example if bank account details were sent
through e-mail, these could be exposed to hackers, and therefore the bank account could be accessed by
those outside a business. This is the same for telephone conversations; details can be obtained just by
listening to what are supposed to be confidential talks. With browser, you should ensure that the transfer
protocol is secured (https) and with e-mails there should be a secured socket layer.
€4,28
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Reviews from verified buyers

Affichage de tous les 2 avis
3 année de cela

8 année de cela

It is well written and shows good points.

4,0

2 revues

5
0
4
2
3
0
2
0
1
0
Avis fiables sur Stuvia

Tous les avis sont réalisés par de vrais utilisateurs de Stuvia après des achats vérifiés.

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
rapidhelp Pearson
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
2539
Membre depuis
8 année
Nombre de followers
1938
Documents
78
Dernière vente
2 année de cela
Personal Folder of BTEC L3 IT Practitioners (Achived D*DD)

Former CANDI student studying Computer Forensics in Middlesex University. Achieved D*DD in BTEC L3 Extended Diploma in IT Practitioners. Work inspired by others and own research, only uploading theoretical documents. I\\\'d like to stress the fact that you should not completely copy the work, but use the provided work as a guide to what you need to write. If you have any queries, feedback, or anything else. Feel free to send me a message and I\\\'ll reply as soon as possible!

Lire la suite Lire moins
3,3

65 revues

5
20
4
12
3
12
2
9
1
12

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions