SlideShare a Scribd company logo
Impact on IT
System
Breaches
AJAY JASSI
How an organisation’s IT
systems can be breached
I.T systems need a variety of security features to prevent their systems
from being breached.
The easiest method of getting onto an organisation's network without
knowing any protection passwords is by using a Ethernet cable in the
site. This will enable the user accessing data that has been stored and
shared on the network. A security feature to prevent this is by using a
MAC filtering.
Emails in the organisation can be hacked easily by guessing a simple
password, or by asking general questions which may possibly be their
security question if they had forgotten their password.
Removable data devices can be used to steal data by transferring the
items or by physically stealing the organisations devices which has
backups stored onto.
Common security threats
These common threats are mostly internally done.
The main cause of this is untrained and unprofessional staff and
employees. This is mainly from them being un-protective and are being
lazy to look after data as the possible treats may not affect them or
aren't aware about them.
Another threat is malware, which can be affected with weak firewalls
and security protection software on the computer systems.
Potential impacts of security
threats
This may have impacts on the businesses profitability, as more money
will be required to spend to maintain and repair the I.T systems, data
and the networks . This will cause them a long-term effect as they will
need to take out loans in the future.
If another business has got records and data of the business, they can
used this a threat to compete with them by offering cheaper deals and
offers to the same audience and customers. This will ruin the businesses
reputation as existing and new customers will choose the other
business offering better and cheaper services.
Potential threats
This is when danger is found which can harm the system, which is
detected by the computer security.
Botnet attack
This is also known as Malware. It occurs when performing tasks on the
internet.
These happens without the user knowing by spreading from emails,
servers and fraud attacks.
Spam
This is an electronic virus which is hidden in fraud emails.
These are sent over through the internet by adverting fraud.
Adware
This is a software which automatically downloads in the background
advertising pop-ups when online, and popup is opened.
Trojan
This is a hacking program which is not self-replicating.
These attack on the operating system while performing on unsecure
webpages.
worm
This is a standalone malware which is on the computer that spreads to
others by the network and servers.
Spyware
This is a software which monitors and receives information from other
computers. These are installed by popups and without the user knowing
in the background.
Most common potential
threats
The most common potential threats are Worms, Trojans, Spam,
Spyware and Adware. Worms, and Trojans can harm the computer
system and network, whereas Spyware and Adware can save personal
information such as names, addresses, contact numbers and card
details. This can affect the user as this is used for fraud.
These threats are the easiest to get and cannot be detected by a non-
technical user, without any anti-virus protection software.
Anti- virus protection software detects threats and most of times
removes them. However sometimes the threats cannot or are not
removed with the software.
Impacts of potential threats
Worm: theses impact on the computer system and the internet network
by making everything slow. This happens by taking up a lot of space on
the hard drive which the operating system is on. Worms are can be
removed simply by installing a well known anti-virus software.
Spam: these impact on the computer system, by installing and storing
harmful software and files onto the hard drive. This is not detected by
anti-virus software and has to recognised manually.
Trojan: theses impact on the internet network by using your server to
gather personal details like worm, however more is affected by a Trojan
as they can be broken down into small things, such as proxy, FTP, DoS,
or remote access Trojans.
Spyware: these mainly affect the user as they try finding out personal
details such as credit cards, names, contact numbers and addresses.
This is then used as fraud or a scam.
Adware: these are very similar to Spyware, and mainly affects the user.
Adware normally finds out the user’s name, age, gender, email
addresses, passwords, pc configuration and users web history. From this
can find out more information and use this towards fraud and
scamming.
Legal responsibilities
It is the employer's responsibility to protect data in the organisation, by
relying and trusting their employees and staff.
Without putting the business at risk the employer would need to
employee trained and trustworthy staff.
However it is important that the employer ensures that the work
environment and his employees are safe and are following the health
and safety procedures.
For a business to success the employer will need to take responsibility
to lead the team.
Legislation to protect IT systems
and data (data protection act)
Computer systems and data can be protected by an act that was but
together by the government which is called the ‘Data Protection Act’.
This is mainly used by business, organisations and the government.
They secure their data by using computerised systems to ensure that
the data is kept safe and secure, without no transfers of anyone outside
of the UK without adequate protection.
There are also stronger legal protection to protect people in the
business for information such as ethnic, religion, criminal record, health,
sexual health and politic thoughts.

More Related Content

What's hot

Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and remove
jreidmichele
 
Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and remove
jreidmichele
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challengesVishakha Joshi
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
Dani Díaz
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
Aqib Syed
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical ChallengesRam Dutt Shukla
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
Danny Doobay
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
Denise Bailey
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
Synchronized security
Synchronized securitySynchronized security
Synchronized security
DefCom Technology
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02mark scott
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
Topsec Technology
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
haneen Emeir, CISA, ISO27001
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 

What's hot (19)

Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and remove
 
Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and remove
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Synchronized security
Synchronized securitySynchronized security
Synchronized security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 

Viewers also liked

Basics of Twitter
Basics of TwitterBasics of Twitter
Basics of Twitter
Ajay Jassi
 
Embedded Devices
Embedded DevicesEmbedded Devices
Embedded Devices
Ajay Jassi
 
Installing software
Installing softwareInstalling software
Installing software
Ajay Jassi
 
Software installation for wireless nic
Software installation for wireless nicSoftware installation for wireless nic
Software installation for wireless nic
Ajay Jassi
 
Software Licences
Software LicencesSoftware Licences
Software Licences
Ajay Jassi
 
Installing Hardware
Installing HardwareInstalling Hardware
Installing Hardware
Ajay Jassi
 
P2- Technical Presentation- Tablets
P2- Technical Presentation- TabletsP2- Technical Presentation- Tablets
P2- Technical Presentation- Tablets
Ajay Jassi
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
Ajay Jassi
 
Smart TVs
Smart TVsSmart TVs
Smart TVs
Ajay Jassi
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
Ajay Jassi
 
Testing software
Testing softwareTesting software
Testing software
Ajay Jassi
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
Ajay Jassi
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
Ajay Jassi
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Ajay Jassi
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
Ajay Jassi
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installation
Ajay Jassi
 

Viewers also liked (16)

Basics of Twitter
Basics of TwitterBasics of Twitter
Basics of Twitter
 
Embedded Devices
Embedded DevicesEmbedded Devices
Embedded Devices
 
Installing software
Installing softwareInstalling software
Installing software
 
Software installation for wireless nic
Software installation for wireless nicSoftware installation for wireless nic
Software installation for wireless nic
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
Installing Hardware
Installing HardwareInstalling Hardware
Installing Hardware
 
P2- Technical Presentation- Tablets
P2- Technical Presentation- TabletsP2- Technical Presentation- Tablets
P2- Technical Presentation- Tablets
 
Building Computer System
Building Computer SystemBuilding Computer System
Building Computer System
 
Smart TVs
Smart TVsSmart TVs
Smart TVs
 
Personalising Desktop
Personalising DesktopPersonalising Desktop
Personalising Desktop
 
Testing software
Testing softwareTesting software
Testing software
 
Comparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS XComparison between Windows 8 and Mavericks OS X
Comparison between Windows 8 and Mavericks OS X
 
Reasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the PrecautionsReasons why Hardware is Installed and Potential Problems and the Precautions
Reasons why Hardware is Installed and Potential Problems and the Precautions
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Health and safety requirements for computer maintenance
Health and safety requirements for computer maintenanceHealth and safety requirements for computer maintenance
Health and safety requirements for computer maintenance
 
Potential problems that occur during hardware installation
Potential problems that occur during hardware installationPotential problems that occur during hardware installation
Potential problems that occur during hardware installation
 

Similar to Impact on IT system breaches

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
ErAdityaSingh1
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
karthikvcyber
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
SeniorGaming
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
The critical issues you face when not using antivirus software
The critical issues you face when not using antivirus softwareThe critical issues you face when not using antivirus software
The critical issues you face when not using antivirus software
Antivirus Support
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
Jessica Howard
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Debabrata Singh
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
CabdullhiY
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
WritingHubUK
 

Similar to Impact on IT system breaches (20)

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
What is malware
What is malwareWhat is malware
What is malware
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
The critical issues you face when not using antivirus software
The critical issues you face when not using antivirus softwareThe critical issues you face when not using antivirus software
The critical issues you face when not using antivirus software
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Computer
ComputerComputer
Computer
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 

More from Ajay Jassi

Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
Ajay Jassi
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
Ajay Jassi
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
Ajay Jassi
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
Ajay Jassi
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
Ajay Jassi
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
Ajay Jassi
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
Ajay Jassi
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
Ajay Jassi
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
Ajay Jassi
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
Ajay Jassi
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
Ajay Jassi
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
Ajay Jassi
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC
Ajay Jassi
 
Removing Security Risks from PC
Removing Security Risks from PCRemoving Security Risks from PC
Removing Security Risks from PC
Ajay Jassi
 
Identifying Security Risks
Identifying Security RisksIdentifying Security Risks
Identifying Security Risks
Ajay Jassi
 
Earl's Ices Computer Configuration
Earl's Ices Computer Configuration Earl's Ices Computer Configuration
Earl's Ices Computer Configuration
Ajay Jassi
 
P3 dataflow around pc
P3   dataflow around pcP3   dataflow around pc
P3 dataflow around pc
Ajay Jassi
 

More from Ajay Jassi (17)

Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Configuring personal desktop
Configuring personal desktopConfiguring personal desktop
Configuring personal desktop
 
Preaparation for new software application
Preaparation for new software applicationPreaparation for new software application
Preaparation for new software application
 
Hardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware ProviderHardware Documentation and Benefits of Hardware Provider
Hardware Documentation and Benefits of Hardware Provider
 
IT job role description for Technical Support Engineer
IT job role description for Technical Support EngineerIT job role description for Technical Support Engineer
IT job role description for Technical Support Engineer
 
Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)Characteristics for IT Employee (P1)
Characteristics for IT Employee (P1)
 
Preparation for Installing Hardware
Preparation for Installing HardwarePreparation for Installing Hardware
Preparation for Installing Hardware
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
 
Installation of Windows 7 using USB
Installation of Windows 7 using USBInstallation of Windows 7 using USB
Installation of Windows 7 using USB
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
 
Upgrade Invoice
Upgrade InvoiceUpgrade Invoice
Upgrade Invoice
 
Computer Invoice
Computer InvoiceComputer Invoice
Computer Invoice
 
Test Table for Wireless NIC
Test Table for Wireless NIC Test Table for Wireless NIC
Test Table for Wireless NIC
 
Removing Security Risks from PC
Removing Security Risks from PCRemoving Security Risks from PC
Removing Security Risks from PC
 
Identifying Security Risks
Identifying Security RisksIdentifying Security Risks
Identifying Security Risks
 
Earl's Ices Computer Configuration
Earl's Ices Computer Configuration Earl's Ices Computer Configuration
Earl's Ices Computer Configuration
 
P3 dataflow around pc
P3   dataflow around pcP3   dataflow around pc
P3 dataflow around pc
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Impact on IT system breaches

  • 2. How an organisation’s IT systems can be breached I.T systems need a variety of security features to prevent their systems from being breached. The easiest method of getting onto an organisation's network without knowing any protection passwords is by using a Ethernet cable in the site. This will enable the user accessing data that has been stored and shared on the network. A security feature to prevent this is by using a MAC filtering. Emails in the organisation can be hacked easily by guessing a simple password, or by asking general questions which may possibly be their security question if they had forgotten their password. Removable data devices can be used to steal data by transferring the items or by physically stealing the organisations devices which has backups stored onto.
  • 3. Common security threats These common threats are mostly internally done. The main cause of this is untrained and unprofessional staff and employees. This is mainly from them being un-protective and are being lazy to look after data as the possible treats may not affect them or aren't aware about them. Another threat is malware, which can be affected with weak firewalls and security protection software on the computer systems.
  • 4. Potential impacts of security threats This may have impacts on the businesses profitability, as more money will be required to spend to maintain and repair the I.T systems, data and the networks . This will cause them a long-term effect as they will need to take out loans in the future. If another business has got records and data of the business, they can used this a threat to compete with them by offering cheaper deals and offers to the same audience and customers. This will ruin the businesses reputation as existing and new customers will choose the other business offering better and cheaper services.
  • 5. Potential threats This is when danger is found which can harm the system, which is detected by the computer security.
  • 6. Botnet attack This is also known as Malware. It occurs when performing tasks on the internet. These happens without the user knowing by spreading from emails, servers and fraud attacks.
  • 7. Spam This is an electronic virus which is hidden in fraud emails. These are sent over through the internet by adverting fraud.
  • 8. Adware This is a software which automatically downloads in the background advertising pop-ups when online, and popup is opened.
  • 9. Trojan This is a hacking program which is not self-replicating. These attack on the operating system while performing on unsecure webpages.
  • 10. worm This is a standalone malware which is on the computer that spreads to others by the network and servers.
  • 11. Spyware This is a software which monitors and receives information from other computers. These are installed by popups and without the user knowing in the background.
  • 12. Most common potential threats The most common potential threats are Worms, Trojans, Spam, Spyware and Adware. Worms, and Trojans can harm the computer system and network, whereas Spyware and Adware can save personal information such as names, addresses, contact numbers and card details. This can affect the user as this is used for fraud. These threats are the easiest to get and cannot be detected by a non- technical user, without any anti-virus protection software. Anti- virus protection software detects threats and most of times removes them. However sometimes the threats cannot or are not removed with the software.
  • 13. Impacts of potential threats Worm: theses impact on the computer system and the internet network by making everything slow. This happens by taking up a lot of space on the hard drive which the operating system is on. Worms are can be removed simply by installing a well known anti-virus software. Spam: these impact on the computer system, by installing and storing harmful software and files onto the hard drive. This is not detected by anti-virus software and has to recognised manually. Trojan: theses impact on the internet network by using your server to gather personal details like worm, however more is affected by a Trojan as they can be broken down into small things, such as proxy, FTP, DoS, or remote access Trojans.
  • 14. Spyware: these mainly affect the user as they try finding out personal details such as credit cards, names, contact numbers and addresses. This is then used as fraud or a scam. Adware: these are very similar to Spyware, and mainly affects the user. Adware normally finds out the user’s name, age, gender, email addresses, passwords, pc configuration and users web history. From this can find out more information and use this towards fraud and scamming.
  • 15. Legal responsibilities It is the employer's responsibility to protect data in the organisation, by relying and trusting their employees and staff. Without putting the business at risk the employer would need to employee trained and trustworthy staff. However it is important that the employer ensures that the work environment and his employees are safe and are following the health and safety procedures. For a business to success the employer will need to take responsibility to lead the team.
  • 16. Legislation to protect IT systems and data (data protection act) Computer systems and data can be protected by an act that was but together by the government which is called the ‘Data Protection Act’. This is mainly used by business, organisations and the government. They secure their data by using computerised systems to ensure that the data is kept safe and secure, without no transfers of anyone outside of the UK without adequate protection. There are also stronger legal protection to protect people in the business for information such as ethnic, religion, criminal record, health, sexual health and politic thoughts.