StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Types and Categories of Threats to IT Systems - Essay Example

Comments (0) Cite this document
Summary
The paper "Types and Categories of Threats to IT Systems" states that CISM is an internationally recognized certification. This certification was specifically designed for information security professionals who work is to oversee the day to day running of the system…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Types and Categories of Threats to IT Systems
Read TextPreview

Extract of sample "Types and Categories of Threats to IT Systems"

Download file to see previous pages Threats come from many sources and are therefore many. The first type of threat is Hardware theft. This is referred to as the theft of tangible computer parts. Servers and laptops are mostly targeted. The second threat is natural disasters like hurricanes, floods, fires and earthquakes. Another threat is manmade attacks. The systems may be at risk from individuals, militia groups and terrorists who are out to cause mayhem. The fourth type of threat is Malicious Software. Viruses replicate themselves from one system to another over a shared network leading to the destruction of commands. Viruses are sometimes hidden in Trojan horses which becomes hard for the system execs to recognize them. Data theft by special programs is another threat. Crackers use special programs known as Spybots which they embed in free software. Spybots collect information that may be useful for the crackers. A rootkit is a program that allows crackers to access a system whenever they want to. This malicious software can be categorized as Malware, Spyware, or Riskware.

Most unauthorized access is done through remote access software like GoToMyPC and Terminal Services. This makes it impossible to track or catch users. In such a case, security should be tightened on system access. Passwords should include longer phrases, include a combination of both upper and lower cases and special characters like percentage sign on the keyboard. This makes it harder for unauthorized users to guess. User interface options like ‘Remember Password’ should be avoided at all costs. Storing passwords should be done in an encrypted way to ensure their security. Once encryption has been done to passwords, Access Control Lists (ACL) is used to control unauthorized access. An insecure wireless network offers avenues for a system to be attacked easily. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Types and Categories of Threats to IT Systems Essay Example | Topics and Well Written Essays - 1750 words, n.d.)
Types and Categories of Threats to IT Systems Essay Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/1810944-mis-and-security
(Types and Categories of Threats to IT Systems Essay Example | Topics and Well Written Essays - 1750 Words)
Types and Categories of Threats to IT Systems Essay Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1810944-mis-and-security.
“Types and Categories of Threats to IT Systems Essay Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/1810944-mis-and-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Types and Categories of Threats to IT Systems

Categories of Crime

...Types and Categories of Threats to IT Systems... Types and Categories of Threats to IT Systems... general, there are two different types of law in the United s of America, criminal law and civil law. Though there are numerous subcategories under each of these general headings, the main distinction is defined by the fact that, as per the American Bar Association, civil cases involve two people having a dispute, while criminal cases enforcing public codes as embodied by the law. Another factor of difference in criminal law is incarceration. If found guilty of a crime, a person will usually be sentenced to a term of prison, as well as possibly fines and loss of property; in a civil matter, a person may face either of the latter two, but not usually...
3 Pages(750 words)Essay

Types of Accounting Systems

...Types and Categories of Threats to IT Systems... Types and Categories of Threats to IT Systems... The two major types of accounting systems that are used by accountants are accrued based and cash basis accounting. Transactions under accrued based accounting that changed a company’s financial statements is recorded in the period in which the events occur (Weygand, Kieso, Kimmel, 2002, pg.89). Earnings are recognized when earned and expenses when they are incurred. Accrued based accounting is utilized by the majority of corporations and businesses in America. The GAAP framework is designed to work under accrued based accounting. The second method that businesses can use to keep track of their economic activity is cash based accounting. “Under cash...
4 Pages(1000 words)Term Paper

Different Types of Renewable Energy Systems

...Types and Categories of Threats to IT Systems... Types and Categories of Threats to IT Systems... Energy Systems Abstract Renewable energy is one of the most important innovations and options which the world in general has considered. These sources of energy have been prompted by the global warming crisis and the call for reducing the impact of energy sources on the environment. As such, renewable sources include solar energy, geothermal energy, biomass energy, wave and tidal energy, nuclear, fuel cells, and compression natural gas. These sources are presented in this paper, with specific discussions on the use and application of these sources on Australia. Renewable energy is one of the most important innovations and options which the wor...
55 Pages(13750 words)Research Paper

Compare various types of information systems

...Types and Categories of Threats to IT Systems... Types and Categories of Threats to IT Systems... Different Types of Information Systems In a business activity, a help desk is regarded as a place where a consumer of information technology can call to get assistance with a problem. In a lot of organizations, a help desk is merely a single individual’s with a phone number and an essentially structured scheme to deal with the problems that stream in. In big organizations, a help desk may comprise of a group of specialists utilizing software to assist track the spot of difficulties and other unique software to assistance assess problems. Traditionally, the term s utilized to assist users within the enterprise. A connected term is call centre, a place ...
4 Pages(1000 words)Assignment

Advantages Of Various Types Of Economic Systems

...Types and Categories of Threats to IT Systems... Types and Categories of Threats to IT Systems... Of Various Types Of Economic Systems Contents Contents 1 Introduction 1 Analysis of the Statement 2 Conclusion 4 References 4 Introduction Economy seeks to find a solution to the basic problems of the economy. The resources that are available in an economy at a particular point of time are restricted. However, the human beings have unlimited wants. Thus it is clear that there exists a discrepancy between the demand for the various kinds of resources and the supply of these in an economy. The objective of economics is to allocate these resources in the most optimal manner and in doing so the intervention of the market mechanism is inevitable. The eco...
4 Pages(1000 words)Assignment

Types of Information Systems Used Within Organizations

...Types and Categories of Threats to IT Systems... Types and Categories of Threats to IT Systems... Osman English 23 February 2009 Information Systems An Information System is a system of data records, persons, and activities that process information and data in an organization. It also includes an organizations automated and manual process. Simply put, Information Systems are hardware and software systems that support data-intensive applications. Another explanation of Information Systems is that it is a specific software application that is used to store data records in a computer system; it can also automate some of the information processing activities of an organization. The field of information technology use computer based Information...
2 Pages(500 words)Essay

Categories of Computer Crime

...Types and Categories of Threats to IT Systems... Types and Categories of Threats to IT Systems... Head: COMPUTER CRIMES Categories of Computer Crimes School Computer Crimes Modern information technology, such as the internet has initiated new forms of crimes and made perpetration of old felonies effortless. Computer crimes may involve identity theft, cyberstalking, scams and frauds, hacking, creation of malicious codes, child pornography, and violation of copyrights. Criminals use computers to facilitate the embezzlement of money and properties; theft of confidential records; and alteration and destruction of valuable files. The misuse of the computer may involve the falsification of computer signatures through unauthorized codes; the creation of ...
2 Pages(500 words)Essay

Types of Economic Systems in Political Economy

...Types and Categories of Threats to IT Systems... Types and Categories of Threats to IT Systems... is a large and complex term that describes how individuals, groups, institutions and the government at large make decisions on the allocation of limited resources to several competing wants. In any economy, there are always many competing wants from citizens, which the state is mandated to fulfill effectively, however, in their bid to fulfill this needs, they are always confronted by few and unlimited resources, for this reason, a choice steps in (Gregory & Stuart 2013 35). Economics has several branches that that deal with how this important economic question is answered in the fields that they represent. Political Economics According to the history ...
7 Pages(1750 words)Essay

Threats of Online Management Systems

...Types and Categories of Threats to IT Systems... Types and Categories of Threats to IT Systems... to Sew Case Study 1B-IT Advice to RTS COIS20024—Systems Management Overview Term 2, Prepared and Submitted by Liang, CHEN S0202086 Due Date: 15 September 2010 Date Submitted: Executive summary Running of businesses requires a lot of charisma and choice of the best methods in solving problems. Different stages of business growth are faced with different challenges and thus require different set of solutions. The method chosen should be economically viable and the benefits thereof should be immense to help propel the business to higher levels. Some of the methods chosen are meant for small and starter businesses while others are meant for big and dev...
13 Pages(3250 words)Term Paper

Information Security, Types of Threats and Modes of Classification

...Types and Categories of Threats to IT Systems... Types and Categories of Threats to IT Systems... security Introduction: Information security is an important aspect of the commercial and private organizations that deal directly with the customers. Their records are of importance not just to the organizations but also have large value to the customers’ privacy, security and safety. While earlier forms of data were manual, modern time’s data is largely computerized. In modern times almost all segments of working sphere are computer enabled and are largely reliant on them. Businesses, office works, institutes all are dependent upon the technology and computers. However the usage of computer brings along certain pre requisites with itself which need...
7 Pages(1750 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Types and Categories of Threats to IT Systems for FREE!

Contact Us