Maggottyhighcapeit.files.wordpress.com



Syllabus Focus: Unit 2 Module 3 Content 3Specific Objective 3: explain how Information Technology System components can be threats, vulnerabilities, counter measures, attacks and compromises to organizations;Content: For example, threats posed by the Internet, such as by providing access to the Internet to employees the organization is exposed to lawsuits, viruses and hacking; encryption as a two-edged sword; difficulties experienced by organisations in the disposal of obsolete equipment.Threat This is defined as an expression of intention to inflect evil, damage or injury.Vulnerable In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware, a script code injection, a SQL injection or misconfiguration.CountermeasuresA defense counter measure used to prevent and exploit from being successful. Counter AttacksCounter attacks are techniques involving simultaneous blocking and retaliation, usually aimed at vulnerable pressure points in your system.Employees can expose the organization to lawsuitsTypes of threatAdwarePrograms that secretly gather personal information through the Internet and relay it back to another computer, generally for advertising purposes. This is often accomplished by tracking information related to Internet browser usage or habits.Adware can be downloaded from Web sites (typically in shareware or freeware), email messages, and instant messengers. A user may unknowingly trigger adware by accepting an End User License Agreement from a software program linked to the adware.DialersPrograms that use a system, without your permission or knowledge, to dial out through the Internet to a 900 numbers or FTP site, typically to accrue charges? Hack ToolsTools used by a hacker to gain unauthorized access to your computer. One example of a hack tool is a keystroke logger -- a program that tracks and records individual keystrokes and can send this information back to the hacker.HoaxUsually an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus. Hoaxes are detectable as having no file attachment, no reference to a third party who can validate the claim, and by the general tone of the message. Joke ProgramsPrograms that change or interrupt the normal behavior of your computer, creating a general distraction or nuisance. Harmless programs that cause various benign activities to display on your (for example, an unexpected screen saver).Remote AccessPrograms that allow another computer to gain information or to attack or alter your computer, usually over the Internet. Remote access programs detected in virus scans may be recognizablecommercial software, which are brought to the user's attention during the scan. Spy wareThese are stand-alone programs that can secretly monitor system activity. These may detect passwords or other confidential information and transmit them to another computer.Spy ware can be downloaded from Web sites (typically in shareware or freeware), email messages, and instant messengers. A user may unknowingly trigger spy ware by accepting an End User License Agreement from a software program linked to the spy ware.Trojan HorseA program that neither replicates nor copies itself, but causes damage or compromises thesecurity of the computer. Typically, an individual emails a Trojan horse to you-it does not email itself-and it may arrive in the form of a joke program or software of some sort.VirusA program or code that replicates; that is, infects another program, boot sector, partition sector, or document that supports macros, by inserting itself or attaching itself to that medium. Most viruses only replicate, though, many do a large amount of damage as well. WormA program that makes copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive in the form of a joke program or software of some sort.Two threats or vulnerability and a counter measure an how it affect the organizationCell PhonesTo video the office e.g. .sensors, locks etc.Pretending to be on the phone talking to prise-The person who wants to harm the company know where the locks and security are.AttacksSingled out/picked on eg.Digicel try hack to the system on put in to get credit pay millions of dollars on there security system.EncryptionIs the double edge code –encryption money to family and you forgot the encryption codeDisposalCan’t scrap them.It has an effect on the society and May the company (brand) ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download