4.3.5 - ICT Security Policies - Threats and Consequences
Teacher recommended
?- Created by: Annie
- Created on: 04-05-13 22:47
View mindmap
- Threats and Consequences
- Theft (More Likely)
- Hacking oftens leads to theft of data - only needs an Internet connection and a PC
- Laptops, PDAs and Smartphones are most at risk as they dont have the physical security of servers and desktop PCs
- Reasons to hack: Pleasure, monitor organisations, stealing data, disruptions, blackmail etc.
- Hardware can be stolen and the data stored is also gone
- Data Protection Act Implications
- Natural Disasters (Extreme)
- Volcano
- Relocation of Work
- Lava could destroy equipment
- Smoke & Fire damage
- Interfernce with Internet connection and power lines
- Earthquake
- Building damage falling on top of ICT facilities
- Interference with Internet connection
- Lightning
- Affects communications
- Power cuts - could lose data
- Flood
- Short circuiting
- No electricity and power cuts
- Losing Data
- Water destroying hardware
- Gales
- Could damage building with equipment inside
- Interference with Internet Connections (speeds)
- UK is not heavily affected by tectonic activity but California and Japan are often affected
- Volcano
- Fire (More Likely)
- Can be caused from outside sources (e.g. Bush fires)
- Most commonly started by electrical faults or incidents within the building with the ICT systems
- Sprinklers can be purchased to avoid total destruction however they require foam rather than water to cause less damage to equipment
- ICT systems can take time to clean and be operable again afterwards
- Terrorism (Extreme)
- ICT systems can also be destroyed by bombs
- Bombs can affect communications even if the attack is a distance away because mobile networks goes down
- Normally aimed at governments but businesses can get caught up with it
- Consequences
- Legal Action
- Companies may wish to take legal action to ensure threats don't reoccur
- Covered by Computer Misuse Act
- If companies don;t look after personal data, it can cause trust issues
- Covered by Data Protection Act
- Companies may wish to take legal action to ensure threats don't reoccur
- Loss of business and income
- Businesses are much more likely to fail if their ICT systems do not work reliably
- Staff need to spend time getting systems up and running rather than the core work
- Systems are unable to take or process orders when they are down
- Customers will go else where
- Loss of reputation
- Customers are likely to use alternate suppliers, particularly when they already have doubts about buying online
- If companies lose their data, it undermines the customers' trust
- Companies suffer if they get known for a lack of reliability with suppliers and customers affected
- Legal Action
- Sabotage and Deliberate Misuse
- Power spikes are not uncommon even at home and can be controlled by surge protection devices
- Systems need to be able to deal with a loss of power and power fluctuations which can destroy computers. This need bot be sabotage, it could be accidental
- Short term power loss can be controlled by UPS (Uninterruptible Power Supply) which is a set of constantly charged batteries which power the key systems and are normally charged continuously
- When the mains power is cut, they continue operating until the batteries are flat (up to around 2 hours)
- Short term power loss can be controlled by UPS (Uninterruptible Power Supply) which is a set of constantly charged batteries which power the key systems and are normally charged continuously
- Viruses are a form of sabotage and include worms, trojans, spam and spyware
- Spyware: Self installing software which gathers information about a person's internet and personal data
- Trojans: A program with harmful or malicious code in order to gain control and to cuase damage to computers - non-replicable
- Viruses: A program file which can spread to different computers which is able to cause trouble by damaging hardware, software, files to adding annoying effects
- Spam: Sending an email on a large scale to many people - Junk mail
- Worms: A program which can replicate itself to be able to spread to other computers
- Adware: Adverts which are displayed whilst a program is running
- Cyberattacks by remote controlled botnets to take down websites - often used as blackmail
- Theft (More Likely)
Comments
Report
Report