The internet has brought upon a new revolution of global interconnection where contacting someone on the other side of the world is just a click away, but with this international phenomenon comes an increased susceptibility with unfamiliar technology. Internet crime is compiled of all non-physical crime with the aid of a computer. Although broad in definition internet crimes are largely composed of acts such as cyber fraud, ‘phishing’ (username and password hacking), cyber stalking and hacking. Internet crime does not pose an overwhelming issue in society in terms of its
Trojan’s are one threat it is a type of malware designed to provide unauthorized, remote access to a user’s computer. Trojan horses do not have the ability to replicate themselves like viruses; however, they can lead to viruses being installed on a machine since they allow the computer to be controlled by the Trojan creator.
A threat is defined as a potential cause of an incident that may cause harm of systems and organisation, or data. A potential and obvious threat is someone physically stealing hardware, or data. Physical threats are any incident that could result in the loss or physical damage to a computer system, there are threats that are pretty much unpreventable such as fire, floods, lightening, and earthquakes, and these are all physical threats that are uncontrollable. The humidity in rooms which computers are in does to an extent need to be controlled, if the room is too hot or cold if could have a negative effect on a computer system. There are also human threats such as; vandalism, theft, disruption, accidental or intentional errors.
Threats and vulnerabilities could be explained separate, but since the two together equal risk together they shall remain. When considering threats in information systems security auditing all aspects must be thought of, but first what
The fourth spoke on the wheel of terrorism is “computer crime”. The use of computers can be used in a good way or can also be abused. Cyberattacks are a huge threat to our national security and technological infrastructure.
There are several different kinds of threats that we should consider and do our best to avoid. A few examples that are on the rise are:
There are many countries where terrorist activities are simply a part of life and where criminal activities are commonplace. Even in well-developed countries there can be problems. One of the most insidious of these activities, however, is cybercrime. It may seem less dangerous because it is not physically damaging to the person who is being targeted, but gaining access toa person's private information can cause serious damage to that person's good name and reputation, along with his or her credit, ability to obtain employment, and other parts of life. Something has to be done, but by the time issues are corrected there are new issues appearing. It can feel like a losing battle. Because of constant technological change, new challenges are arising regarding information access and privacy.
With the overload of technology use and major technological advancements, people all around the world are constantly using the internet. It has become common practice for people to submit their private and confidential information on the web for practical, entertainment and business purposes. That being the case, the internet has turned into a vulnerable place for others to have access to these classified materials. The retrieval of private information of an individual is not the only issue. Terrorist attacks via the internet are a major concern as well. Unlike individual attacks, terrorist cyber-attacks effect a much broader group of people. “President Barack Obama has identified cybersecurity threats as among the most serious challenges facing
A threat, in the connection of PC security, alludes to anything that can possibly bring about genuine damage to a PC framework. A threat is something that could possibly happen, however can possibly bring about genuine harm. Dangers can prompt assaults on PC frameworks, systems and that's only the tip of the iceberg.
A1. The most serious information security threat to most businesses today is their Reputation. Many well established business have a certain reputation in the market. But this reputation of theirs is destroyed by people working in the organization who leak information to cyber criminals and hacktivists. Criminals, after obtaining such information leak it or use it to blackmail the company for their own interest. New implementations of BOYC (bring your own cloud) and BOYD (bring your own device) also has their own risks.
Prevalent to the current trend now is the dependency of the society on Information technology and communication systems. Every aspect of human life is one way or the other linked and controlled by information technology tools. The importance of information technology cannot be over emphasized as its unavailability could lead to a form of disaster or the other. Pivotal infrastructures like finance, healthcare, education and security are driven by information technology. However, information technology and its benefits are accompanied by vulnerabilities and risks that can be exploited by people with the necessary technical skills. Individuals like ‘Hackers’ and ‘Cyber Terrorist’ can cause disruption to information systems, commit financial fraud and also attack computers and networks. These attacks and disruptions could result to violence against people and properties. In some cases, death, serious injuries and severe economic loss could occur as a result of these attacks.
Some security breaches are undoubtedly the direct results of people’s mistakes. Human errors cause most breaches, even if they tend to be far less expensive as compared to the breaches caused by malicious and criminal attacks. These errors include
1. What are the four basic classic threats to IT systems and data? Give an example of each.
Technology in the classroom is important to assist in the learning process; however this is creating new challenges for teachers. Teachers are now required to educate students on the importance of technology ethics. Computer ethics is the moral guidelines that govern the use of computers and networks (Shelly, G, Gunter, G, and Gunter, R 2012). Ethics in the classroom also requires teachers to explain what plagiarism is and the proper way for students to give credit for information attained from another source. Teachers must also have a plan in place to address internet security, as well as devise a student use agreement and discuss ethical practices while using technology in the classroom.