unauthorized actions in the system such as stealing data taking control of the

Unauthorized actions in the system such as stealing

This preview shows page 1 - 2 out of 2 pages.

unauthorized actions in the system such as stealing data, taking control of the system or disrupting service operations. 4. Data loss. This is an error condition in information systems in which information is destroyed during storage, transmission or processing due to theft, human error, viruses, malware, or power failure. 5. Denial of service (Dos). This is a cyber attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily disrupting its services. This is accomplished by flooding the targeted requests with surplus and unnecessary requests to overload the system and prevent legitimate requests from being done. Ways to prevent this cyber threats; Regularly install and use updated antivirus and antispyware software to increase the ability to detect attempts and actual breaches then manage them. Train employees in cyber security principles this will increase their awareness on cyber threats and also equip them with skills to deal with threats as they come. Put up firewalls for internet connections, secure and hide WI-FI network which is by regularly changing passwords. The passwords should be strong, long and cannot be guessed off. This prevents hackers from using your connection to breach into the company’s cloud or hijack accounts. Require individual user accounts for each employee while limiting their access to data and information and authority to install software. This protects company’s data from malicious insiders. Make backup copies of important business data and information due to cases of data loss.
Image of page 1
Image of page 2

You've reached the end of your free preview.

Want to read both pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture