StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

IT Threats to Information Security - Essay Example

Cite this document
Summary
This essay "IT Threats to Information Security" presents information technology that has made many tasks easier to perform it has also brought certain threats that did not exist before its invention. These threats can happen to any business if caution is not taken…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful

Extract of sample "IT Threats to Information Security"

IT threats could also lead to serious violations of the laid down processes which could lead to the cancellation of licenses. A good example is where client confidentiality is breached due to a hack where customer information is accessed. In some industries, e.g., banking this could lead to license cancellation if the institution does not prove to have taken measures to prevent such happenings.             Most businesses have an e-business in place to ensure that they can reach their clients electronically.

Some of the threats that are associated with conducting an e-business include: Website defacement An e-business operates mostly on an online based application. This is provided on the company website. Clients log in to the company website and make purchases and wait for shipment. This poses a third party risk who control access data. This can lead to website defacement when attackers gain control of the website. The use of the website to make sales could also lead to denial of service attacks leading to loss of revenue for a given period.

Counterfeit goods - Information technology has made it easy for the production of counterfeit goods. It is now easier to store, share and reproduce products due to the simplicity enabled by information technology. Products that are highly affected by this risk include software, games, films, music, and games. Their digital nature makes them vulnerable to this threat. Peer-to-peer sharing of these digital products also leads to a huge loss of revenue to businesses that produce and sell these products.

The availability of counterfeit goods at lower prices also leads to reputational risk which in turn leads to loss of revenue. Clients could end up preferring the counterfeit more than the original product leading to a total crippling of the business. Networks Organizational impact - Information technology operates through networks that can easily be attacked. These networks relay information from one location to the next. An attack on the network could lead to a total loss of services which causes loss of business and income.

Customer records could also be accessed, and this leads to a poor image of the company.             Companies need to ensure that they have put enough information security measures to try and avoid these threats. To do this, there are various strategies that can be applied. One of them is the use of technologies such as firewalls. The password policy of the business needs to be strong enough to ensure that it is not easy to access company information.

By doing so, businesses will be maintaining data confidentiality that is required. Data integrity and its access will have been maintained by ensuring that the information is only accessed by those authorized to access it. Incurring an extra cost to achieve this should be something that businesses are prepared for.  

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(IT Threats to Information Security Essay Example | Topics and Well Written Essays - 500 words, n.d.)
IT Threats to Information Security Essay Example | Topics and Well Written Essays - 500 words. https://studentshare.org/information-technology/1892445-it-threats-to-information-security
(IT Threats to Information Security Essay Example | Topics and Well Written Essays - 500 Words)
IT Threats to Information Security Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1892445-it-threats-to-information-security.
“IT Threats to Information Security Essay Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/information-technology/1892445-it-threats-to-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF IT Threats to Information Security

The existence of botnets is the most serious threat to the information security today

The existence of botnets is the most serious threat to the information security today Introduction According to Hudak (nd), generally, a botnet is a set of computers that interact with one another through the Internet to perform a particular distributed task.... Impact of Botnets on information security Those in favor of the establishment of botnets argue that botnets make work easier and is a creative way of making cash just like any other job (Schiller, 2007)....
4 Pages (1000 words) Essay

How to Achieve Business Information Security in Cyberspace

However, with the easier access to information, the risk is placed in sharing vital information that may lead to the exchange of private data (Schneier, 2012).... Moreover, the platform offers the avenue to lead to information loss that can be erased to conceal the identity of the perpetrators.... The validity of the accorded information is placed in the position to ensure security is maintained and the spread of inconveniences limited.... These systems have witnessed security breaches that have limited the performance to a minimal scale and lead to inefficient results in goal achievement....
3 Pages (750 words) Essay

Security Threats and Defenses

information security is a major concern to all organizations.... In addition, information security need be given priority and adopted as a distinct value in any institutional culture governing staff behavior.... It also occurs where employees are not well briefed on internal controls and information security patterns of an organization.... The term social security in the context of organization is defined as the act in which, employees of an organization are manipulated by outsiders to rely key and confidential information details regarding an organization (Hadnagy, 2011)....
2 Pages (500 words) Essay

Entifying Information Assets, Threats, and Vulnerabilities in Top Information Security Breaches of the Decade

Five of information security breach that occurred in the last decade include are: insider misuse, unauthorized access by insiders, spam, malware, and unauthorized access by outsiders. Insider information security BREACHES A security breach or security violation is any occurrence that leads to un ized access of data, networks, services, devices, and/or applications by bypassing security mechanisms that exists.... Five of information security breach that occurred in the last decade include are: insider misuse, unauthorized access by insiders, spam, malware, and unauthorized access by outsiders....
2 Pages (500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us