Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Task 1 Unit 7

No description
by

Ashley Booth

on 28 September 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Task 1 Unit 7

The impact of potential threats to IT systems By Ashley Booth Contents page Malicious damage What is it? Malicious damage can be many things. One form of malware are viruses, Trojans, spy ware and worms. These can install onto your computer and cause damage to the computer. Why is it a threat Malware damage Potential threats Counterfeit goods Technical failures This is a threat because if a system catches a virus, then they might find it difficult to use the computer or it could damage the system. What is it? Counterfeit goods Counterfeiting is when you make of copy or a fake of a product. This can be bad for a company because they would lose out on profit because people would buy the fake product. Why is a threat? This is a threat because if the fake product starts selling the company would be losing profit and wouldn't get the original product. What is it? Technical failure Technical failure can be anything from, the loss of a server, storage devices, internet failure or even human failure. This can cause considerable disruption to any individual workstation or the whole organisation. Why is it a threat? This is a threat because this is the most common threat to a IT system. This can also be the biggest threat as well because this can cause the most damage to a system. Malicious damage Internal External Internal What is it? Internal damage is when you gain access to a IT system or data without sending something to the computer. With this access you can really damage a business. An example of this would be if someone put a virus on a memory stick and plugged it into a computer, the virus would have internal access to the system. Damages it can cause One damage that this can cause is a virus attack. These occur when a rogue code has entered a system. They hide themselves inside other codes. They can then reproduce and cause damage to data. Another thing that can occur is Trojans. These are designed to allow others to access a system. They can be transported through email attachments, infected downloads or infected CDs or DVDs. & Punishment The penalty of illegally accessing a computer can range from 6 months to 5 years in prison. The individual that hacks the computer can get a minimum of 3 years or a fine. External What is it? External damage can be caused by many different things. This can range from, virus attacks, trojans, worms, hacking with piggybacking, tunnels and probes, forging data, phishing and identity theft. Damage it can cause Some attacks might be to to attack data or jam access to resources but some attacks might not cause any damage so they may be unnoticed. If they can access data this might be to do identity theft or just to ruin the business. Punishment As I mentioned in the previous slide the punishment for hacking a computer can be 6 months to 5 years with a minimum of 3 years or a fine for the hacker. Threats related to E-commerce Website Defacement What is it? Website defacement is a attack on a website that changes the visual appearance of the site. Why is it a threat? This is a threat to a e-commerce business because the website will lose income to recover the website and it will also lose the goodwill of the customers. Control of access to data via third-party suppliers What is it? Granting system access to a third-party provider is a risk that can introduce security threats and technical and business dangers into your business. Why is it a threat? This is a threat because if a business gives access to a third-party supplier that means they can access all the data of the business and can lead to lots of damage if in the wrong hands. Denial of service attacks What is it? This is a attempt to make a resource unavailable by sending worms to leave trojans that will flood devices with traffic. Why is it a threat? For an e-commerce system, any denial of service is a denial of income. While they may only last a few minutes, with loss of service and the recovery time, an organisation stands to lose income. Counterfeit Goods Products at risk There is some much technology that you can use to duplicate all media formats on computers. Software and games can be easily copied using CD/DVD duplication software. Software now exists that they can create images of the CD/DVD and load these as a virtual CD/DVD. There is also software that can compress the versions of the media for portable devices. Distribution mechanisms Distribution of pirated media is a rife, as soon as a system closes, another appears. The first system to do this was Napster. Now this is a fully legitimate service. This type of distribution uses a peer-based file sharing system. Another popular way of getting pirated media is from boot sales. Organisational impact An organisation may suffer the impact in a variety of ways. A potential loss of service for the customer, or the internet, can impede the organisation's ability to operate.

There may be a loss of business or income through the loss of data because the customers would not be able to trust the business to hold their information.

Another way a organisation may suffer is increased costs. This may be that they want to upgrade the technology and that means the insurance would go up. These costs would be passed onto the customer. Information security Confidentiality If a business takes data about customers, they need to make sure that the data confidential. If it isn't then the customer would not be able to trust the business and the business would lose customers. They need to make sure that they follow the Data Protection Act because not only would they lose a customer, they could also be sued. to make sure the data is confidential, they need to make sure that only the employee who uses the data can see it. Integrity and completeness of data A business needs to make sure that the integrity of the data is correct. The business would be useless if they need customer information and it was incorrect. checking that the data is correct may involve reviewing the data about the business. To check if customer information is correct they could try asking the customer to check if the data is correct. Access to data It is important to see who has access to what data because it controls the availability of the data. A business can review who has access to data to see if those who have access may no longer need it. They can also have passwords to protect data which only authorised users can access. 3. Potential threats
4. Malware damage
5. Counterfeit goods
6. Technical failure
7. Malware damage
8. Internal
9. External
10. Threats related to e-commerce
11. Website defacement
12. Control of access to data via third-party suppliers
13. Denial of service attacks
14. Counterfeit goods
15. Products of risk 16. Distribution mechanisms
17 & 18. Organisational impact
19. Information security
20. Confidentiality
21. Integrity and completeness of data
22. Access to data
23. References References Information technology level 3 BTEC national book
Full transcript