Types Of Threats In The Organisation

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Introduction

In this document I will be explaining different types of threats in the organisation and the impacts it has on the organisation.

Potential threat can follow into different categories:

malicious damage;

internal;

external;

access causing damage

viruses;

access without damage;

threats related to e-commerce;

Organisational impact

Internal attack

Is usually someone within the organisation becomes disaffected and try to hack the organisation network. This could cause a disaster in the company because staff can lose all their files. This can also occurs when a group of staff in the company try to attack or exploit any weakness on the network. For instance the attacker can use various amount of tools, skills to instigate a complicated network attack and could even try to remove all the evidence of the attack, so other staff don’t notice in the organization. Administrators, technician, and programmers they have more knowledge than other employees. They could really profit from any attack in the organisation they also might try to send an internal attack in the organisation through its network system.

External attack

An external attack is usually intruders from outside trying to get access from the organisation files. Hackers can view all your files and where you have been in the internet. If your network is not secured that will be easy for people from outside to have access on your data. You should have strong password so intruders can’t get into your wireless and use it. If you are not protected from the firewall or antivirus you could be vulnerable from hackers.

Virus protection

Virus protection we use it to check if there is any virus on the computer and delete them on the computer. You can also use it to scan your computer from any malicious virus such as Trojan, worms. An antivirus will not only keep your system safe while your online it would be able to spot when anything potentially bad might be happening on your PC, and stop it before it destroys your computer. There are different type of antivirus freeware and third party for example: AVG this antivirus it is free but this version is limited it doesn’t give you the full features just the basic. You can also get third party virus protection such as McAfee you can get it for around £32.49 with this version you get the full features it gives you extra protection such as network protection it has two ways firewall to stop people from getting access into your computer.

There are different types of viruses here two examples:

Trojans

Trojan it a type of virus that attackers can use to create a fake log in account (interface) to catch all the users passwords when logging into a computer. This type of virus usually uses an email to send the username and password to the attacker. The attacker will be able to access all your data once all the details been received, and you could lose all your data. Intruders could even change your log in credentials you won’t be able to access your computer.

Denial of service (attack)

This is when you can’t access the website, when you enter a web address into your browser to view the website you have to wait till the server proceed your request, there could be an attacker try to send too many request which could cause too much traffic and nothing can go through, you won’t be able to view the page you requested. Hackers can also use spam mail you will receive lots of email everyday which can decrease the space limits that you have in your account, and the problem with that is you won’t be able to save or receive any mails.

Worms attack

Worm it a type of virus that an attacker can use to send lots of copies to another computer. It was designed to exploit any weakness found on a computer. This malicious utility can really harm your network and uses lots of bandwidth; the only difference between a computer virus and worms is that viruses only infect or damage all the files on your computer. Worms it sent through a network to infect your pc, it can delete all your files on the system delete all the encrypted files or even send documents through email.

Phishing

This is when someone tries to obtain somebody else personal information such as, online shopping website eBay, Amazon or even your banks details. Usually you will get an email you will find it on your junk mail. If it asks you any bank details don’t give anyone your bank detail it is personal. Also in schools, college, university they have got students information such as their home address, telephone number. The college have to be aware of these threats, it could really affect the organisation they could lose vital data.

Hacking

A hacker is someone who tries to break into home user computer or even a company to obtain personal information without them knowing. Hackers can even try to break into your email account. They can delete your messages, read all your messages or even change the password of that account. Hackers can also try to corrupt an organisation website. This could be a staff who used to work for that company and tries obtain sensitive information this could customers information that are stored on the company computer.

Identity theft

ID theft is when someone pretends to be someone else. For e.g. Go to the bank and open a bank out by using somebody else name. They could even obtain customers personal information such as home address, telephone number this could really harm the company. In a big organisation it vital to lock all the doors where all the server are stored and also have an alarm system in place to stop thief anyone try to break into the room. This prevents intruders from accessing the server and causing damage to it. The server itself should be in a secure room.

Piggy backing

This is when an intruder tries to use someone else wireless without them knowing. If your wireless is not secured with a weak password such as "Password1" then this would be easy to break into, anyone and they would be able to access it. The problem with this is it will slow down your internet. Also the person piggybacking on the wireless can download illegal software so that it cannot be traced back to them.

E commerce

e- commerce organisations can be very vulnerable whether it is internal or external. There are lots of fraudulent activities such as credit cards, this leaves the website expose to threat from clients. Transactions can be put into the system by intruders, hackers or Trojan horses. On the system it will show as if it is the real customers’ transactions. Usually hackers try to break into the firewall and the internal network and by encrypting sensitive data.

Technical failures

Not every problem can be resolved; this can still be seen as a threat, for example if a server goes down for 40 minutes this leaves the server vulnerable from attacks during that period. Technical failures you can’t prevent it, there are different methods that be put in place to keep the server in good conditions and stable.

What impact does it have?

Loss of service: A potential loss of service this can have a profound effect on the user. For example, if a company installs new software in office times then all the servers will be down so users cannot access their files. For instance a bank are upgrading the system so no one can access there bank accounts in normal hours to get cash out (customers will complain).This would also result in downtime which means loss of pay and the company could lose customers.

Increased costs: additional cost can be added, this usually happen when there is an error. For e.g. You might need to replace equipments or even repair it this means the company will have to spend more money when they could use that money for something else.

Poor image/ bad reputation:

It is vital to maintain a good image of the company in the eyes of the customers. Poor image can have a big impact in the company you could lose customers. If your interaction with the customers is really poor the organisation will have a bad reputation.

Hardware failure: This usually happens when the hardware is damage also when there is burning components. This can also occur immediately after the computer has been damaged and usually aren’t recoverable. You should always backup all your data. you don’t want to lose all your data especially in a big company, you should have a copy of aback up with all your data.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now