Course Hero Logo

Identify and evaluate three threats to the security

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 8 - 9 out of 15 pages.

01.Identify and evaluate three threats to the security of networked information thatCrystal Valley may face.A computer system threat is all that leads to harm or bribery of data or physical damage to thehardware and/or frame.The risk may or may not occur but it can cause genuine harm. Threatscan lead to attacks on intentional, accidental or cause by natural disasters.VirusWe’ve all heard about them, and we all have our fears. For everyday Internet users, computerviruses are one of the most common network threats in cybersecurity. Statistics show thatapproximately 33% of household computers are affected with some type of malware, more thanhalf of which are viruses.Viruses have long occurred in computing. A virus is a computer database that, like a medicalvirus, can copy and infect other computers. Viruses are spread over networks or via USB drivesand other portable media. A virus is a software programmed to attach to a specific piece ofeffecting code. When that code is run acceptably, the virus is affected and cracks to duplicateitself by increasing to other files.WormComputer worms are pieces of malware programs that replicate quickly and spread from onecomputer to another. A worm spreads from an infected computer by sending itself to all of thecomputer’s contacts, then immediately to the contacts of the other computers. Interestingly, theyare not always designed to cause harm; there are worms that are made just to spread.Transmission of worms is also often done by exploiting software vulnerabilities. While we don’thear about them much today, computer worm are one of the most common computer networkthreats.When we considering the Crystal Valley, these viruses and worms may affect totheir systems as well. Nowadays Companies face big competitiveness and all theCompanies are looking to take over other Companies good way or a bad way. So theseviruses and worms are use against the Companies which is not god at all. As an exampleComputer worms can exploit network configuration errors (for example, to copythemselves onto a fully accessible disk) or exploit loopholes in operating system andapplication security. Many worms will use more than one method in order to spread copiesvia networks. So Crystal Valley may affect those worms and viruses in their informationsystem as well.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 15 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
N/A
Tags
Decision Making, Computer virus, Data Protection Act 1998

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture