preview

Essay about Threats to Computer and Data Systems Today

Decent Essays

Introduction
Safety of information is the most valuable asset in any organization particular those who provide financial service to others. Threats can come from a variety of sources such as human threats, natural disasters and technical threats. By identifying the potential threats to the network, security measure can be taken to combat these threats, eliminate them or reduce the likelihood and impact if they should occur.
Hacking
Outsider attackers often called hackers because they gain access to system without authorization or permission from the owners or legitimate user. With information technology, comes increase risk of fraud and information theft. Hackers can steel sensitive information from one organization and sell it to a …show more content…

They can identify websites frequently visited by users, those vulnerable websites that can be targeted and what users often search for.
Virus
There are special viruses that creates different types of malicious problems on a network or computer, for instance it will create or open programs to perform tasks. Viruses is also used for denial of service attacks, password cracking and many more. This can be fought against by having a reliable protection service; it is safer if this is taken from the provider itself.
Deniss Calovskis who is a native of Latvia in Eastern Europe, he was arrested by the US government because he was involved in creating numerous computer viruses called Gozi, Zeus Trojan and spy eye Trojan
Denial of service
Denial-of-service is an attack aimed to refuse access for legitimate users and disrupt service availability according to www.msdn.microsoft.com. This type of security threat according to www.tech.co.uk is rapidly increasing on the Internet due to open doors on Websites. By using the Internet, companies increase the risk of denial of service attack. Denial of service can also be caused by too many connected to a server at the same making run slow or unavailable to others. People who deliberately abuse a network server are often difficult to track down.
Outsider attacks also increased substantially over the past year, UK

Get Access