P1: display messages etc. A virus works by embedding

P1: Explain
the impact of different types of threat on an organisation.



We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

this assignment, I will be explaining different types of threat that could
impact on an organization. I will be also explaining what a threat is and what
its disadvantages, how can it affect a business and what are the causes.


What does the word
threat mean?

threat is a person or thing to likely cause damage or danger. in the context of
the technology is the risk that can cause harm to a computer system. It’s also
a danger that might happen or not but has the probable to cause significant
damage. Threats can also attack the network that your computer is connected to
and more.


What types of
threats to computers can you think of?

are many types of threats to computer and some of them are:


Malware – Another word for malware is scumware, which is a malicious
software designed to affect your computer’s performance this will influence
your daily productivity and efficiency. There are few ways a malware can attack
you delete your personal files, steal your data, change your setting etc.,
unsettling network connection etc.


Spyware – A spyware is a software program that is created to collect
information without the user’s permission, which is usually done when you click
on a link or advert that redirects the user to a malicious website. Spyware is
usually used to record user’s preferences, therefore, is used for targeting the
user attention with advertisements that he likes.


Viruses – A computer virus is a malicious code to change how the PC
works which is intended to spread to one computer to another if it’s connected
to the network. It is a program, script, or macro intended to cause damage,
steal confidential information, change the setting, display messages etc. A
virus works by embedding or connecting itself to a program or document that
supports macros to execute its code. The virus can cause intended or unexpected
effects, such damaging the system software by manipulating or destroying data.


Trojans – Another word for trojans is a trojan horse which is a
program intended to infect your computer and steal confidential information
from the user’s computer. This is the most common method used by hackers having
access to the targeted computer or secretly send personal information to other



malicious damage is when a person intentionally makes an illegal crime to a
system such as delete or corrupt personal information, data or software
programs. There are two types of damage that can be caused which are internal
and external. Internal damage is caused by an employer in an organization, the
reason might be he’s unhappy and he’s looking for revenge having direct access
to the system and intentionally damage computer systems. Or external damage is
made when an outside hacker remotely hacks the system by sending a virus such
as Trojans or phishing emails which the employee will open and leave the system
vulnerable to attacks. Through that, the hacker has the access to valuable
information about the company. However, there are many security techniques that
you use to lock down your access from the hackers, but they will always work to
find a gap in the system to cause damage or steal data.


related to e-commerce

e-commerce threat is using the internet for misuse act with the intention of
stealing, fraud, security breach. With the latest and more advanced technology,
new e-commerce will try to enter the market and find always ways to improve to
become even better, creating rivals. There are many types of e-commerce threats
and some of them are accidental, some are intentional, and some of them are due
to human error. The most ordinary security threats are phishing attacks, data
misuse, hacking, credit card frauds and unprotected services.



goods are not genuine items, it’s intentionally made to look like real. These
can range from clothes, perfume, cosmetics but not only those electrical items
such as pirated DVDs, CDs, computer games, software, and hardware. These can
potentially affect the creator of the product leading to a loss of its profit.
The recipient can be put in an illegal position because of their actions
(distribution of not genuine items). These counterfeit goods put the products
at risk, all these replicas and knock off cheap items make the buyer lose money
on it and for the company that sells genuine items.


Failures and its effect

technical failure is an undesired error in technology-based systems. These
failures are always going to happen as long as the technology is being used.
Meaning for instance if the server for storage devices went down, or you have
no active internet connection, these problems can cause interference to an
individual or an organization. The effects to a company of technical failure
can be very expensive. For example, the CCTV of the organization won’t record
anymore because it is connected to the cloud which is down. Therefore, it’s a
major problem for the company because the thefts cannot be monitored and



human error is one of the most common faults in the IT industry and is a threat
nevertheless it is unforeseeable when a human is to make a mistake. For
instance, when a human share the password with anyone can give the person the
access to everything that you do, they can monitor actions etc. This could lead
the rivals to be more advanced, vulnerable to attack and it is illegal due to
Data Protection Act.


of equipment

Theft of equipment is just a problematic threat to the
company. The equipment in an organization could be stolen from a USB can
contain confidential information to discarded printouts that may not have been
shredded which can contain important information. Stolen items can be a problem
to the organization as they need replace their equipment with their own budget.
Stealing something important can also lead to losing income profit for the