Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Implications of Threats
Transcript of Implications of Threats
Implication of Threats
A computer program that is designed to harm or gain unauthorised access to a computer system.
Someone who gains unauthorised access to a computer system.
Usually to steal, modify or delete data.
Can be performed through brute force or more technical means.
Through human error we can lose data and damage IT systems. For example:
Spilling liquids on devices.
Accidentally deleting/overwriting files.
This is a major reason why businesses backup data.
Emails sent purporting to be a reputable company but really sent by malicious user.
User clicks on link in email and fills in form that appears to be on the businesses website.
Personal data is then sent to malicious user to misuse.
Corrupt or delete data which could cost an organisation huge sums of money.
Individuals may lose photos with emotional value.
Could also gather information from user for bank/identity fraud.
Accessing financial information in order to steal money from individuals or businesses.
Causes harm to organisations reputation and confidential data could be used to blackmail.
Individual data could be used for identity fraud.
Used to gain access to information to steal money from individuals or organisations.
Individuals can also be affected by identity fraud.
Can be used to gain information to help hack an organisation.
Individuals and businesses lose important data.
Costs a lot of money to recover. E.g. important lost records, specialist data recovery.
Damaged hardware will need to be replaced.