4.3.5 - ICT Security Policies - Threats and Consequences

?
  • Created by: Annie
  • Created on: 04-05-13 22:47
View mindmap
  • Threats and Consequences
    • Theft (More Likely)
      • Hacking oftens leads to theft of data - only needs an Internet connection and a PC
      • Laptops, PDAs and Smartphones are most at risk as they dont have the physical security of servers and desktop PCs
      • Reasons to hack: Pleasure, monitor organisations, stealing data, disruptions, blackmail etc.
      • Hardware can be stolen and the data stored is also gone
        • Data Protection Act Implications
    • Natural Disasters (Extreme)
      • Volcano
        • Relocation of Work
        • Lava could destroy equipment
        • Smoke & Fire damage
        • Interfernce with Internet connection and power lines
      • Earthquake
        • Building damage falling on top of ICT facilities
        • Interference with Internet connection
      • Lightning
        • Affects communications
        • Power cuts - could lose data
      • Flood
        • Short circuiting
        • No electricity and power cuts
        • Losing Data
        • Water destroying hardware
      • Gales
        • Could damage building with equipment inside
        • Interference with Internet Connections (speeds)
      • UK is not heavily affected by tectonic activity but California and Japan are often affected
    • Fire (More Likely)
      • Can be caused from outside sources (e.g. Bush fires)
      • Most commonly started by electrical faults or incidents within the building with the ICT systems
      • Sprinklers can be purchased to avoid total destruction however they require foam rather than water to cause less damage to equipment
        • ICT systems can take time to clean and be operable again afterwards
    • Terrorism (Extreme)
      • ICT systems can also be destroyed by bombs
      • Bombs can affect communications even if the attack is a distance away because mobile networks goes down
      • Normally aimed at governments but businesses can get caught up with it
    • Consequences
      • Legal Action
        • Companies may wish to take legal action to ensure threats don't reoccur
          • Covered by Computer Misuse Act
        • If companies don;t look after personal data, it can cause trust issues
          • Covered by Data Protection Act
      • Loss of business and income
        • Businesses are much more likely to fail if their ICT systems do not work reliably
        • Staff need to spend time getting systems up and running rather than the core work
        • Systems are unable to take or process orders when they are down
          • Customers will go else where
      • Loss of reputation
        • Customers are likely to use alternate suppliers, particularly when they already have doubts about buying online
        • If companies lose their data, it undermines the customers' trust
        • Companies suffer if they get known for a lack of reliability with suppliers and customers affected
    • Sabotage and Deliberate Misuse
      • Power spikes are not uncommon even at home and can be controlled by surge protection devices
      • Systems need to be able to deal with a loss of power and power fluctuations which can destroy computers. This need bot be sabotage, it could be accidental
        • Short term power loss can be controlled by UPS (Uninterruptible Power Supply) which is a set of constantly charged batteries which power the key systems and are normally charged continuously
          • When the mains power is cut, they continue operating until the batteries are flat (up to around 2 hours)
      • Viruses are a form of sabotage and include worms, trojans, spam and spyware
        • Spyware: Self installing software which gathers information about a person's internet and personal data
        • Trojans: A program with harmful or malicious code in order to gain control and to cuase damage to computers - non-replicable
        • Viruses: A program file which can spread to different computers which is able to cause trouble by damaging hardware, software, files to adding annoying effects
        • Spam: Sending an email on a large scale to many people - Junk mail
        • Worms: A program which can replicate itself to be able to spread to other computers
        • Adware: Adverts which are displayed whilst a program is running
      • Cyberattacks by remote controlled botnets to take down websites - often used as blackmail

Comments

Mr A Gibson

Report

Fabulous collection of the threats to an organisation's network and the consequences of what could happen if a disaster should befall them.

Print this off and stick on your wall!

Numero Uno

Report

does this come from the mark scheme ?

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »