Potential threats to ICT systems
and organisations

Unit 07: Organisational Systems Security
Potential threats to ICT systems and
organisations
•   Counterfeit goods:
•   Organisational impact:
•   Security of Information:
•   Hacking (Unauthorised access):
•   e-commerce related threats:
•   Damage/Destruction of systems or information:
Know potential threats to ICT systems
and organisations
• Counterfeit goods:
  â–« products at risk e.g.
    ď‚–   software,
    ď‚–   DVDs,
    ď‚–   games,
    ď‚–   music;
  â–« distribution mechanisms e.g.
    ď‚– boot sales,
    ď‚– peer-to-peer networks
Organisational impact
• loss of service
  â–« Complete loss
  â–« Increased downtime
• loss of business or income e.g.
  â–« through loss of customer records
  â–« increased costs;
  â–« poor image
Security of Information

•   confidentiality
•   data integrity
•   data completeness
•   availability of data as needed
Hacking (Unauthorised access)
• Hacking
  â–« internal by own staff
  â–« external;
• access causing damage to data e.g.
  â–« viruses;
• accessing systems or data without damage e.g.
  â–«   phishing,
  â–«   identity theft,
  â–«   piggybacking,
  â–«   hacking
e-commerce related threats

• website defacement;
• control of access to data via third party suppliers;
• other eg
  â–« denial of service attacks
Damage/Destruction of systems or
information
 • Natural disasters;
   â–«   Fire
   â–«   Flood
   â–«   Earthquake/Volcanic eruptions
   â–«   Hurricanes
 • Man-made
   â–« Deliberate
       ď‚– Malicious damage (internal and external causes);
       ď‚– Theft
       ď‚– War/Acts of Terrorism
   â–« Accidental
       ď‚– technical failures; Mechanical failures e.g. HDD (mtbf)
       ď‚– human errors; e.g. restoring from wrong backup
       ď‚– Fire

Threats to system power point 1

  • 1.
    Potential threats toICT systems and organisations Unit 07: Organisational Systems Security
  • 2.
    Potential threats toICT systems and organisations • Counterfeit goods: • Organisational impact: • Security of Information: • Hacking (Unauthorised access): • e-commerce related threats: • Damage/Destruction of systems or information:
  • 3.
    Know potential threatsto ICT systems and organisations • Counterfeit goods: ▫ products at risk e.g.  software,  DVDs,  games,  music; ▫ distribution mechanisms e.g.  boot sales,  peer-to-peer networks
  • 4.
    Organisational impact • lossof service ▫ Complete loss ▫ Increased downtime • loss of business or income e.g. ▫ through loss of customer records ▫ increased costs; ▫ poor image
  • 5.
    Security of Information • confidentiality • data integrity • data completeness • availability of data as needed
  • 6.
    Hacking (Unauthorised access) •Hacking ▫ internal by own staff ▫ external; • access causing damage to data e.g. ▫ viruses; • accessing systems or data without damage e.g. ▫ phishing, ▫ identity theft, ▫ piggybacking, ▫ hacking
  • 7.
    e-commerce related threats •website defacement; • control of access to data via third party suppliers; • other eg ▫ denial of service attacks
  • 8.
    Damage/Destruction of systemsor information • Natural disasters; ▫ Fire ▫ Flood ▫ Earthquake/Volcanic eruptions ▫ Hurricanes • Man-made ▫ Deliberate  Malicious damage (internal and external causes);  Theft  War/Acts of Terrorism ▫ Accidental  technical failures; Mechanical failures e.g. HDD (mtbf)  human errors; e.g. restoring from wrong backup  Fire