Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary P1- Explain the different security Threats that can affect the IT systems of organisations.

Beoordeling
-
Verkocht
-
Pagina's
7
Geüpload op
20-01-2023
Geschreven in
2021/2022

P1- Explain the different security Threats that can affect the IT systems of organisations.

Instelling
Vak

Voorbeeld van de inhoud

P1- Explain the different security
threats that can affect the IT
systems of organsiations.

Here are 4 types of Security threats.,

• Internal
• External
• Physical
• Social Engineering and Software threats



Software threats

Malware
This is an app which sets up destructive software in the system of user. Moreover,
Software detects activity of user and gather entire classified information of user. Here
are several kinds of malwares software shown below:

• Virus – virus produces a duplicate copy of itself that expand all over the files of
computer and doesn’t bring in notice of user. It enters the duplicated print of
itself into the different computer program occurs.
• Worm – Worms are related to viruses. Worm is a duplicate code which arrives
through emails that appear authorized.
• Trojan horse – Trojan horse is another type of malware that declares itself to be
original & misguide people of its actual purpose. Additionally, it works in the
background and tries to make an entrance into user’s system.
• Ransomware – Ransomware prevents access to the system of user and force them
to pay the price to reinstall the right to have access. In 2021, a city called
Baltimore was attacked by ransomware known as Robbin hood, it was
extremely powerful that it halted all the activities in the city which includes,
property transfers, tax collection and government emails for weeks. It was an
extremely expensive attack for the city as it coted them more than $18 millions.

, • Spyware – Spyware is the type of malware that get access to the system, steal
confidential information and the data about internet usage without bringing
these events into the user’s notice.
• Bonet - Bonet are also one of the malwares. They spread the infection all over
the network which is connected by many devices altogether. They are mainly
known and used for transferring spams
• Backdoors- backdoor is type of malware makes the normal authentication
procedures ineffective to get high-level access to a system.
• Bots- bots are type of a program that works according to the set of instructions
automatically. For example., automated replies, etc.

Phishing
Phishing is one of the cybercrimes in which people are targeted through emails,
phone calls by a stranger who acts like a legitimate institution to trick people so they
can gain access to classified information such as credit cards, debit cards and
passwords.

Here is the real-life example of phishing email attack. In December 2020, a phishing
attack occurred in USA at healthcare provider. In this attack attackers attacked two
employees. Furthermore, the attacker successfully managed to gain access to the
employees’ email accounts, in result they gained access to the personal details of
over 100,000 elderly patients and these personal details included names, birth, bank
and financial information, insurance information, social security numbers, driver’s
license numbers. This unauthorised access was maintained by attackers for a whole
week.

SQL Injection
SQL is one of the dangerous cybercrimes in which an attacker uses SQL code to
dominate a database of a website and get access to valuable information.

Here is the real-life example of SQL injection happened which is known as Ghost
Shell attack. In this attack hackers belonged to APT group team Ghost Shell aimed at
53 universities using SQL injection. In result, they stole and published personal
records around 36,000 to students, staff and faculty.

Man in the Middle (MITM) Attack
MITM attack occurs when two people are having a conversation and a third party
meaning third person, interferes into the conversation and gather sensitive,
potentially valuable information. For example., Public WIFI, a third person (hacker)

Geschreven voor

Study Level
Publisher
Subject
Course

Documentinformatie

Geüpload op
20 januari 2023
Aantal pagina's
7
Geschreven in
2021/2022
Type
SAMENVATTING

Onderwerpen

$24.15
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
businessopportunity Uxbridge College (London)
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
16
Lid sinds
3 jaar
Aantal volgers
12
Documenten
17
Laatst verkocht
1 jaar geleden

4.5

6 beoordelingen

5
4
4
1
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen