SlideShare a Scribd company logo
1 of 8
Potential threats to ICT systems
and organisations

Unit 07: Organisational Systems Security
Potential threats to ICT systems and
organisations
•   Counterfeit goods:
•   Organisational impact:
•   Security of Information:
•   Hacking (Unauthorised access):
•   e-commerce related threats:
•   Damage/Destruction of systems or information:
Know potential threats to ICT systems
and organisations
• Counterfeit goods:
  ▫ products at risk e.g.
       software,
       DVDs,
       games,
       music;
  ▫ distribution mechanisms e.g.
     boot sales,
     peer-to-peer networks
Organisational impact
• loss of service
  ▫ Complete loss
  ▫ Increased downtime
• loss of business or income e.g.
  ▫ through loss of customer records
  ▫ increased costs;
  ▫ poor image
Security of Information

•   confidentiality
•   data integrity
•   data completeness
•   availability of data as needed
Hacking (Unauthorised access)
• Hacking
  ▫ internal by own staff
  ▫ external;
• access causing damage to data e.g.
  ▫ viruses;
• accessing systems or data without damage e.g.
  ▫   phishing,
  ▫   identity theft,
  ▫   piggybacking,
  ▫   hacking
e-commerce related threats

• website defacement;
• control of access to data via third party suppliers;
• other eg
  ▫ denial of service attacks
Damage/Destruction of systems or
information
 • Natural disasters;
   ▫   Fire
   ▫   Flood
   ▫   Earthquake/Volcanic eruptions
   ▫   Hurricanes
 • Man-made
   ▫ Deliberate
        Malicious damage (internal and external causes);
        Theft
        War/Acts of Terrorism
   ▫ Accidental
        technical failures; Mechanical failures e.g. HDD (mtbf)
        human errors; e.g. restoring from wrong backup
        Fire

More Related Content

What's hot

Chapter 1
Chapter 1Chapter 1
Chapter 1rajjani
 
The importance of antivirus software
The importance of antivirus softwareThe importance of antivirus software
The importance of antivirus softwaresamthking25
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of ComputerFaizan Janjua
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Sean Bradley
 
ResearchProjectPPT
ResearchProjectPPTResearchProjectPPT
ResearchProjectPPTdannyboi17
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Donna Koger
 
How a Simple Hand Shake Can Save the Smart Grid
How a Simple Hand Shake Can Save the Smart GridHow a Simple Hand Shake Can Save the Smart Grid
How a Simple Hand Shake Can Save the Smart GridGautham Govind
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Winston & Strawn LLP
 
Exfiltration slides-v1-release
Exfiltration slides-v1-releaseExfiltration slides-v1-release
Exfiltration slides-v1-releaseEric Koeppen
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerceHimanshu Pathak
 

What's hot (18)

Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Week 12
Week 12Week 12
Week 12
 
The importance of antivirus software
The importance of antivirus softwareThe importance of antivirus software
The importance of antivirus software
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
 
Not IF, but WHEN
Not IF, but WHENNot IF, but WHEN
Not IF, but WHEN
 
ResearchProjectPPT
ResearchProjectPPTResearchProjectPPT
ResearchProjectPPT
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
 
Chap11
Chap11Chap11
Chap11
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
 
How a Simple Hand Shake Can Save the Smart Grid
How a Simple Hand Shake Can Save the Smart GridHow a Simple Hand Shake Can Save the Smart Grid
How a Simple Hand Shake Can Save the Smart Grid
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
 
Exfiltration slides-v1-release
Exfiltration slides-v1-releaseExfiltration slides-v1-release
Exfiltration slides-v1-release
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 

Similar to Threats to system power point 1

Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5sabtolinux
 
Security and privacy
Security and privacySecurity and privacy
Security and privacyMohammed Adam
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterpriseAbha Damani
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abusePrakash Raval
 
Application of security computer
Application of security computerApplication of security computer
Application of security computeribrahimzubairu2003
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptxLearn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptxSakthivel803383
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Atika Zaimi
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measuresjoy grace bagui
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 

Similar to Threats to system power point 1 (20)

Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
 
Threats
ThreatsThreats
Threats
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
Web security
Web securityWeb security
Web security
 
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptxLearn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
Computer crime
Computer crimeComputer crime
Computer crime
 
3-UnitV_security.pptx
3-UnitV_security.pptx3-UnitV_security.pptx
3-UnitV_security.pptx
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 

More from Rebecca Jones

P2 functions and equations from a graph questions
P2  functions and equations from a graph questionsP2  functions and equations from a graph questions
P2 functions and equations from a graph questionsRebecca Jones
 
04 access howtobuttons
04 access howtobuttons04 access howtobuttons
04 access howtobuttonsRebecca Jones
 
03 access howtofrmmaster
03 access howtofrmmaster03 access howtofrmmaster
03 access howtofrmmasterRebecca Jones
 
02 access howtobasicforms
02 access howtobasicforms02 access howtobasicforms
02 access howtobasicformsRebecca Jones
 
01 access howtointroduction
01 access howtointroduction01 access howtointroduction
01 access howtointroductionRebecca Jones
 
Fractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quizFractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quizRebecca Jones
 
03 analysis of_requirementsspecification
03 analysis of_requirementsspecification03 analysis of_requirementsspecification
03 analysis of_requirementsspecificationRebecca Jones
 
Software development lifecycle
Software development lifecycleSoftware development lifecycle
Software development lifecycleRebecca Jones
 
Btec unit 1 the online world learning aim b
Btec unit 1  the online world learning aim bBtec unit 1  the online world learning aim b
Btec unit 1 the online world learning aim bRebecca Jones
 
Intro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_logIntro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_logRebecca Jones
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014Rebecca Jones
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014Rebecca Jones
 
08 e commerce entities
08 e commerce entities08 e commerce entities
08 e commerce entitiesRebecca Jones
 
08 benefits of e-commerce
08 benefits of e-commerce08 benefits of e-commerce
08 benefits of e-commerceRebecca Jones
 
18 database features
18 database features18 database features
18 database featuresRebecca Jones
 
Employee management-security-controls
Employee management-security-controlsEmployee management-security-controls
Employee management-security-controlsRebecca Jones
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryptionRebecca Jones
 

More from Rebecca Jones (20)

P2 functions and equations from a graph questions
P2  functions and equations from a graph questionsP2  functions and equations from a graph questions
P2 functions and equations from a graph questions
 
04 access howtobuttons
04 access howtobuttons04 access howtobuttons
04 access howtobuttons
 
03 access howtofrmmaster
03 access howtofrmmaster03 access howtofrmmaster
03 access howtofrmmaster
 
02 access howtobasicforms
02 access howtobasicforms02 access howtobasicforms
02 access howtobasicforms
 
01 access howtointroduction
01 access howtointroduction01 access howtointroduction
01 access howtointroduction
 
Fractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quizFractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quiz
 
03 analysis of_requirementsspecification
03 analysis of_requirementsspecification03 analysis of_requirementsspecification
03 analysis of_requirementsspecification
 
Software development lifecycle
Software development lifecycleSoftware development lifecycle
Software development lifecycle
 
Btec unit 1 the online world learning aim b
Btec unit 1  the online world learning aim bBtec unit 1  the online world learning aim b
Btec unit 1 the online world learning aim b
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Intro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_logIntro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_log
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014
 
08 e commerce entities
08 e commerce entities08 e commerce entities
08 e commerce entities
 
08 benefits of e-commerce
08 benefits of e-commerce08 benefits of e-commerce
08 benefits of e-commerce
 
18 database features
18 database features18 database features
18 database features
 
1.4 adaptations
1.4 adaptations1.4 adaptations
1.4 adaptations
 
Codesof practice
Codesof practiceCodesof practice
Codesof practice
 
Employee management-security-controls
Employee management-security-controlsEmployee management-security-controls
Employee management-security-controls
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
 

Threats to system power point 1

  • 1. Potential threats to ICT systems and organisations Unit 07: Organisational Systems Security
  • 2. Potential threats to ICT systems and organisations • Counterfeit goods: • Organisational impact: • Security of Information: • Hacking (Unauthorised access): • e-commerce related threats: • Damage/Destruction of systems or information:
  • 3. Know potential threats to ICT systems and organisations • Counterfeit goods: ▫ products at risk e.g.  software,  DVDs,  games,  music; ▫ distribution mechanisms e.g.  boot sales,  peer-to-peer networks
  • 4. Organisational impact • loss of service ▫ Complete loss ▫ Increased downtime • loss of business or income e.g. ▫ through loss of customer records ▫ increased costs; ▫ poor image
  • 5. Security of Information • confidentiality • data integrity • data completeness • availability of data as needed
  • 6. Hacking (Unauthorised access) • Hacking ▫ internal by own staff ▫ external; • access causing damage to data e.g. ▫ viruses; • accessing systems or data without damage e.g. ▫ phishing, ▫ identity theft, ▫ piggybacking, ▫ hacking
  • 7. e-commerce related threats • website defacement; • control of access to data via third party suppliers; • other eg ▫ denial of service attacks
  • 8. Damage/Destruction of systems or information • Natural disasters; ▫ Fire ▫ Flood ▫ Earthquake/Volcanic eruptions ▫ Hurricanes • Man-made ▫ Deliberate  Malicious damage (internal and external causes);  Theft  War/Acts of Terrorism ▫ Accidental  technical failures; Mechanical failures e.g. HDD (mtbf)  human errors; e.g. restoring from wrong backup  Fire