Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.



No description

Russell Rimmer

on 19 September 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Security

Threats to IT Systems Malicious Damage
Malicious damage has intent to harm users or organisations and either gain access to data or cause problems and loss of service. Malicious Damage can take place in a number of ways. Internal Damage
Internal damage can mean damage to computers, servers or systems which will prevent services from working and cause issues on day to day tasks. Access with Damage
Access with damage would refer to a virus, worm or hacking attack which accesses the internal systems and then cause damage to the computers, software systems or network by either deleting or corrupting data, stealing information and passwords and general disruption to work. Access without Damage
Access without damage could occur through viruses, or worms which spread but don't actually cause any harm. For example a email spam worm, while annoying would not actually delete or corrupt any data. Viruses
Viruses come in many forms, some can be very dangerous and delete and corrupt a computer to the point that the computer will become unusable. Other virus are harmless but annoying. It is vital to use anti-virus software to prevent such attacks. Identity Theft
Identity theft may occur through hacking or viruses which collect information from computers. This can lead to people using others email addresses, names and credit card details to purchase items illegally. It can be used to pose as someone else such as creating a Facebook page under someone else's name. Hacking
Hacking attempts happen for many different reasons. Sometimes people may have a vendetta if they were fired or made unemployed. Others have political messages such as the attacks on companies in the USA who supported the anti piracy laws which were being proposed. Hacking could lead to loss of data, identity theft, corporate secrets being stolen and general disruption to a company or user. Counterfeit Goods
Goods can be counterfeited, copied and pirated. This can cause loss of sales and profits and also tarnish the name of a company if a counterfeit good is bought believing it is legit. External Damage
External damage would consistent of damage to the internet access and communication to the outside. For example a denial of service attack would bring down a website or internet server stopping access. E-Commerce Threats
E-commerce threats refers to any form of attack or damage with threats the electrical operations of a company such as the website or online billing. Website Defacement
A website can be hacked and have its content changed or manipulated. This can lead to consumers being confused or causing offense. For example someone hacked the Call of Duty website to link to Battlefield 3. Disruption to Service
Service can be disrupted to a website or a third party suppliers website. This can cause issues for ordering or customers not being able to have access to the website. This can be caused by denial of service attacks or hacking. Software
Counterfeit software can mean pirated DVDs and Films, the quality maybe poor and no money goes to the creator. Software such as games or programs like Photoshop can also be pirated which cause a loss in sale. Programs such as bit torrent are used to pirate software and films using peer to peer networks. Hardware
Counterfeit hardware or knock offs can be damaging to a companies reputation if they are bought as a legit product without knowing. In some countries knock offs of phones are made and passed off as other makes. It will also effect sales at retailers of the legit product. Stolen Ideas
There are also products which do not try to be an identical copy of a product but do steal the look or idea with intent to trick people. For example the Droid X360 is a android based tablet which looks like a PSP Vita. This can harm sales if people are deceived by the similar look. Organisational Impact
All these things can cause problems for a company such as loss of service which in turn can lead to loss of business. It can affect income and dealing with these problems can end up increasing costs having to improve security. Information Security
Keeping information secure
and making sure it is not used for the wrong reasons is essential for a business. Companies must make sure they adhere to the Data Protection Act or face legal action. Confidentiality
Keeping certain information confidential such as staff pay rates, design and research documents and sales numbers is very important. Allowing this information to get out could help competitors or course internal issue between staff and effect work productivity. Data Integrity
Keeping staff and customer data secure is essential. If the data was misued it could be a breah of the Data Protection Act and face legal action. Also keeping customers confidence and returned business it is essential to make sure data is secure. Data Completeness
It is important to make sure the data is both complete, accurate and up to date. Out of date data could lead to errors and shipment and payment issues. It could cause loss of income and business if mistakes are made based on incorrect data. Human Error
Problems can occur through human error such as data input being incorrect. This can cause system failures, wrong shipping address and incorrect payments to be taken. The End
Full transcript