P1: display messages etc. A virus works by embedding

P1: Explainthe impact of different types of threat on an organisation. IntroductionInthis assignment, I will be explaining different types of threat that couldimpact on an organization.

I will be also explaining what a threat is and whatits disadvantages, how can it affect a business and what are the causes. What does the wordthreat mean?Athreat is a person or thing to likely cause damage or danger. in the context ofthe technology is the risk that can cause harm to a computer system. It’s alsoa danger that might happen or not but has the probable to cause significantdamage. Threats can also attack the network that your computer is connected toand more.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

 What types ofthreats to computers can you think of? Thereare many types of threats to computer and some of them are: ·        Malware – Another word for malware is scumware, which is a malicioussoftware designed to affect your computer’s performance this will influenceyour daily productivity and efficiency. There are few ways a malware can attackyou delete your personal files, steal your data, change your setting etc.,unsettling network connection etc.

 ·        Spyware – A spyware is a software program that is created to collectinformation without the user’s permission, which is usually done when you clickon a link or advert that redirects the user to a malicious website. Spyware isusually used to record user’s preferences, therefore, is used for targeting theuser attention with advertisements that he likes. ·        Viruses – A computer virus is a malicious code to change how the PCworks which is intended to spread to one computer to another if it’s connectedto the network. It is a program, script, or macro intended to cause damage,steal confidential information, change the setting, display messages etc. Avirus works by embedding or connecting itself to a program or document thatsupports macros to execute its code. The virus can cause intended or unexpectedeffects, such damaging the system software by manipulating or destroying data.

 ·        Trojans – Another word for trojans is a trojan horse which is aprogram intended to infect your computer and steal confidential informationfrom the user’s computer. This is the most common method used by hackers havingaccess to the targeted computer or secretly send personal information to othercomputers.   MaliciousdamageAmalicious damage is when a person intentionally makes an illegal crime to asystem such as delete or corrupt personal information, data or softwareprograms. There are two types of damage that can be caused which are internaland external. Internal damage is caused by an employer in an organization, thereason might be he’s unhappy and he’s looking for revenge having direct accessto the system and intentionally damage computer systems. Or external damage ismade when an outside hacker remotely hacks the system by sending a virus suchas Trojans or phishing emails which the employee will open and leave the systemvulnerable to attacks. Through that, the hacker has the access to valuableinformation about the company.

However, there are many security techniques thatyou use to lock down your access from the hackers, but they will always work tofind a gap in the system to cause damage or steal data. Threatsrelated to e-commerceAne-commerce threat is using the internet for misuse act with the intention ofstealing, fraud, security breach. With the latest and more advanced technology,new e-commerce will try to enter the market and find always ways to improve tobecome even better, creating rivals. There are many types of e-commerce threatsand some of them are accidental, some are intentional, and some of them are dueto human error. The most ordinary security threats are phishing attacks, datamisuse, hacking, credit card frauds and unprotected services. CounterfeitgoodsCounterfeitgoods are not genuine items, it’s intentionally made to look like real.

Thesecan range from clothes, perfume, cosmetics but not only those electrical itemssuch as pirated DVDs, CDs, computer games, software, and hardware. These canpotentially affect the creator of the product leading to a loss of its profit.The recipient can be put in an illegal position because of their actions(distribution of not genuine items). These counterfeit goods put the productsat risk, all these replicas and knock off cheap items make the buyer lose moneyon it and for the company that sells genuine items. TechnicalFailures and its effect Atechnical failure is an undesired error in technology-based systems. Thesefailures are always going to happen as long as the technology is being used.

Meaning for instance if the server for storage devices went down, or you haveno active internet connection, these problems can cause interference to anindividual or an organization. The effects to a company of technical failurecan be very expensive. For example, the CCTV of the organization won’t recordanymore because it is connected to the cloud which is down. Therefore, it’s amajor problem for the company because the thefts cannot be monitored andprevented. HumanerrorThehuman error is one of the most common faults in the IT industry and is a threatnevertheless it is unforeseeable when a human is to make a mistake.

Forinstance, when a human share the password with anyone can give the person theaccess to everything that you do, they can monitor actions etc. This could leadthe rivals to be more advanced, vulnerable to attack and it is illegal due toData Protection Act. Theftof equipmentTheft of equipment is just a problematic threat to thecompany. The equipment in an organization could be stolen from a USB cancontain confidential information to discarded printouts that may not have beenshredded which can contain important information. Stolen items can be a problemto the organization as they need replace their equipment with their own budget.Stealing something important can also lead to losing income profit for thecompany.