StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Common Information Security Threats - Essay Example

Cite this document
Summary
Common Information Security Threats Introduction The purpose of computers and other network systems is to facilitate information exchange; today, organizations are managed using computer network. This requires respective organizations to implement the use of password and user name; however, such mechanism creates channels for committing computer crimes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Common Information Security Threats
Read Text Preview

Extract of sample "Common Information Security Threats"

Download file to see previous pages

Example in this sense includes interprocess messages. Other data susceptible to compromise from attackers include, information prepared by a program, and stored. In most instances, the data is modified by the hacker. The modified data provides the hacker a chance to exploit the organization’s program. Additional threat in this light involves direct modification; this enables hackers to initiate other indirect modifications. Example includes altering the internal program information. The altered information makes it easier to create a code that operates arbitrary; as a result, an attacker can add an admin user not authenticated by the systems database.

Threats facing service availability Computer and network threats may involve an attack to paralyze service available, such activity halts application functions. In other occasions, an attack on service availability slows down the server. As a consequent, authenticated users are unable to access the server. Compromising service availability involves convincing others to hack the firm’s server, attacking bugs, and particularly, the networking stack. System integrity threats This threat, involve altering the organization’s system to create a system that is not trusted.

Compromise on the integrity of network systems may involve acts such as creating a malicious code, using root access. The intention, involve enabling the system to permit the code used by the hacker. The hacker may capitalize to create a malicious code, as a result of buffer overflow. The moment the hacker accesses administrative control of the firm’s network system, it becomes difficult to mitigate such threat. Additional threat, may involve impersonation of the server by the hacker; as a result, the hacker can retrieve an authentic password and username.

This allows the attacker to obtaining the status of a legal user. An unauthorized user can also alter the firm’s software to prevent certain operations. Example include, repudiating the use of a security item such as credit card. Values for threat and vulnerability Investing on controlling threats and vulnerability within any organization is crucial in terms of minimizing attacks on the information security systems. In essence, it enables the company to prepare adequately, and prevents the anticipated risks.

Further, Identifying threats and vulnerability assist in planning for appropriate security tests. This allows the firm to put in place effective measures to minimize security threats on a long- term basis (Jenkins, 1998). Risk management techniques The appropriate risk management techniques for organizations, involve implementing programs, efficient in terms of protecting information systems. This requires a focus on a risk management policy geared toward establishing a cost-effective security system.

Further, appropriate management

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Common Information Security Threats Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Common Information Security Threats Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1485263-common-information-security-threats
(Common Information Security Threats Essay Example | Topics and Well Written Essays - 750 Words)
Common Information Security Threats Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1485263-common-information-security-threats.
“Common Information Security Threats Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1485263-common-information-security-threats.
  • Cited: 0 times

CHECK THESE SAMPLES OF Common Information Security Threats

Information Security

However, a wide variety of information security threats, particularly computer hacking raises potential challenges to keeping and transferring information securely over the internet.... However, a wide variety of information security threats, particularly computer hacking raises potential challenges to keeping and transferring information securely over the internet.... Threats and Vulnerabilities Small businesses having limited knowledge of computers, networks, and software are highly vulnerable to a range of serious information security threats....
3 Pages (750 words) Research Proposal

Information Security Management

This paper ''Information Security Management'' takes a look at the security threats that an SME faces online and its need of information security management to tackle these threats.... This paper would take a look at the security threats that an SME faces online and its need of information security management to tackle these threats.... Information security management not only allows an organization to tackle security threats that it faces but also allows it to measure the impact the attack would have on the performance of the business (Alexander, Finch, & Sutton, 2008)....
18 Pages (4500 words) Research Proposal

Transforming International Security

The essay "Transforming International Security" discusses the threats of international terrorism on international level.... All the nations have to make serious efforts to counter the threats to international securities, separately as well as jointly.... Today the world is full of threats as well as opportunities.... With every passing moment, the world community is getting increasingly concerned at the threats from the non-state actors, particularly the terrorists, who have immense capabilities of carrying on international activities on a large scale....
17 Pages (4250 words) Essay

Information Security Risk and the Possible Threats to Information Security

The paper describes information security risk as any danger that may lead to the loss or damage of information.... While determining the course of action to be taken in maximizing security, the current activities and performance of the current information systems should be properly scrutinized.... This means that the information concerning these organizations can be accessed from any place in the whole world.... The most common threat to information is computer viruses....
7 Pages (1750 words) Research Paper

Key Information Security Issues

This case study "Key information security Issues" presents the case scenario of Jack Doe that represents most of the internet users who are unaware of the presence of online attackers.... Furthermore, it demonstrates the usefulness of information security in an organization.... At times the acronym CIA is used regarding information security to refer to confidentiality, integrity as well as the availability of data.... With that, this report will detail key information security issues concerning Jack's handling of his work information, associated attacks, risks, impacts of attacks, countermeasures, and mitigation effects of the countermeasures....
8 Pages (2000 words) Case Study

Security of Information in Commercial or Business Organisations

It also aims to outline some of the physical, human, and technological countermeasures to the security threats discussed.... The management of vulnerabilities and threats to assets is a major challenge for business organizations.... The management of vulnerabilities and threats to assets is a major challenge for business organizations.... The effect of such threats on firms is potentially great because of the risk of financial loss and lack of business continence services....
15 Pages (3750 words) Literature review

Management of Information Security

There have been numerous recent cases of security threats to business information holdings inhuman, electronic, and physical form.... There have been numerous recent cases of security threats to business information holdings inhuman, electronic, and physical form.... … The paper “Management of information security” is a perfect variant of literature review on information technology.... The paper “Management of information security” is a perfect variant of literature review on information technology....
13 Pages (3250 words) Literature review

Current Trends in Information Security

The paper "Current Trends in information security" examines the significant current threats to information security and the most important controls that WebCenter should be considered as a priority to mitigate the risks of these threats being realized.... hellip; The primary objectives of information security are; integrity, confidentiality, and availability.... Current threats to information security The two major threats to information security include; phishing and hackingPhishingPhishing, also known as “carding” or “brand spoofing,” refers to a form of social engineering where an attacker, known as a phisher, deceptively retrieves data of a legitimate user's confidential information by copying electronic communications from an organization in an automated manner (Shi and Saleem 2012)....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us