Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Malicious Damage
Software is often "Pirated" which is a word for counterfeit, this is usually downloaded via torrents or peer to peer programs such as Lime wire. This has a massive effect on the owners of the software as the pirated versions are distubuted for free. Counterfeit Goods Technical failures is where thing go wrong with the equipment that you are using, both hardware and software. Human error is also a technical failure as it affects the data that is being inputted. Technical Failures A website defacement is the substitution of the original page by a system hacker that breaks into a web server and alters the hosted website creating one of their own. Website Defacement Control of access to data is where the access to the data has been compromised for example a DDos attack send numerous connections to the host of a website in order to overload the bandwidth causing the website to slow or become unresponsive. the effects of this can be small and simply be that the website slows down for a few moments then resumes later on. It can have more serious implications such as taking the website down meaning the business loses trade. Control Of Access To Data There are many different products that are counterfeited, nearly anything that you can buy from a retail store will be counterfeited. The major market is in pirated media, this includes DVD's, software, music and games. They can be counterfeited in two different ways, they can be physical or digital.
Counterfeit physical media will often be distributed at markets and car boot sales, generally the will small private sellers that burn the media onto discs and sell them at any available sales event.
Counterfeit digital media is distributed via the internet, either using P2P programs such as lime wire or bear share or torrents downloaded from websites like Pirate Bay and ISOhunt. Counterfeit Goods At Risk This is the effects that these attack cause on organisations. they can range from small insignificant damages to large company threatening effects. Low rating damages would be loss/delay of service, this is where the attack simply stops the company from working for a certain period of time, this can have a loss of income but the business should be swiftly back to operation.
A more serious impact would be loss of data and corruption, this can cause the whole business to halt.trading and it can be a long time before full systems are back to full order. Organisational impact There are many laws that require the information you hold to be secure. the reason data and information must be kept secure is not just to abide by the law but the confidentiality of the customers is important. Unless the customer has gave permissions for you to pass the information on to others you cannot do so. This also means that you have to ward of the threat of hackers as they will steal the information and distribute it illegally.
Also you have to ensure that there are systems in place to ensure the integrity of the data. This means that the data imputed is correct and valid for what you are holding it for. If the data has been compromised then its integrity will not be in order meaning it wont be correct. Information security FIN.