Why are information systems vulnerable to destruction error and abuse.docx

This preview shows page 1 - 2 out of 3 pages.

Why are information systems vulnerable to destruction error andabuse? Information systems are vulnerable to destruction, error and abuse because of a lot of factors mainlycaused by unauthorized users gaining access to company networks.Common threats against contemporary information systems:Threats can occur on the client communication lines corporate servers and corporates systems level.On the client level, threats involve unauthorized access and errors.Threats originating from communications lines may involve wire-tapping and sniffing messagemodifications, theft/fraud and radiationThreats on corporate servers may include hacking of the servers planting of viruses and worms,theft/fraud and denial- of-service attacks.Threats on the corporate systems may include stolen copied and manipulated company data andcrashes in hardware and software.Malware:Malware is the name used when talking about malicious software.Malware may be represented in the form of a computer virus a worm or a Trojan horse.Distinguishing among a virus a worm and Trojan horse:A virus is a rogue software program that piggybacks onto software programs that are already oncomputer.It may also attach itself to data file.Viruses plant themselves without the user’s knowledge and can either display message and imagesonto the screen or erase programs or data from the hard drive.Worms are computer programs that copy themselves to many computer on a network.They spread more quickly than viruses because they do not need to act a result from human actions.Trojan horses are software programs that appear to be nonthreatening but later do something that isunexpected.They present sneaky way for malware to enter a system and are not actually considered to be virus.Hackers and how they create security problems and damage systems:Hackers are unauthorized users to a computer system who have bad intentions.They create security problems because they essentially find weak sport in the security features thatare used by web sites and computer systems.They can also damage systems by sealing important and even confidential information.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture