This presentation discusses the various kinds of security threats faced by Tesco, including computer viruses, botnets, spam, and worms. It also explores the security procedures implemented by the organization and provides a method to assess and treat IT security risks. Additionally, it highlights the importance of trusted networks in IT security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
IT SECURITY
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P1 Kinds of security threats of Tesco ï‚´Computer viruses- Computer viruses are the pieces of the software that able to design so that it can be spread from one computer to other computer . As per the statistics 33%of household computers over elaborate with some kinds of malware, more than half of them are viruses. ï‚´Botnets- It can be used regarding anything from targeting the attacks on the servers, so that to able to run spam email campaigns. Botnetsincluded many computers ,as it finds difficult to stop for many businesses.
CONT.. ï‚´Spam -Everyone is familiar with the Spam as the junk emails tends to squeeze businesses servers as well as annoyrecipient all across the organization. Spam becomes a threat for the computer security as it contains harmful links, also overload the mail server as well as distribute additional spam ï‚´Worms -Jiggling is considered as its way into network. It is a wormthat is deployedto the self replicate from one computer to the another. The only thing makes it differ from the virus is that it needed no user interaction to get spread. According to this software hat is applied within large quantities for a short duration of time.
P2 Security procedures of the Organization ï‚´It is considered as the detailed step by step instructions on implementing ,security controls list from the Tesco's security policies. ï‚´It should cover the hardware as well as software components that assists the process of the business and security related business procedures. Such as Onboarding of a new staff member. ï‚´Security policy also refers to the well-defined plans, rules as well as regulations systems that access the Tesco's system as well as information included in it.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P3 A method to assess as well as treat IT security risks Identify Threats – It depends on the various assets or information that has been compromised such as Tesco's data center located within a region where there are environmental threats such as Floods. Are the industry are becomes more actively targeted as well as hacked by a Known crime syndicate or the policy of the government. Threat modeling is considered as the crucial activity that assists risks to know the threats as well as various ways as these threats can causes risks so that it causes risk to realized through the exploiting vulnerabilities. Such as finance risk, it can be managed by making of the budget
P4 Trusted network becomes a part of an IT security how ï‚´Trusted networksuch as Mobile securityis considers as the topof the worry for the company. As all the workers of the Tesco frame used the Smartphones ,as they also access corporate data from the mobile phones as well as thismeans that keep of the sensitive information into the wrong hands within an intricate puzzle. ï‚´As it considers higher than ever . It is easy to focus on the malware of this type as mobile malware infections are becomes incredible common within the real world Data breaches incidents and many physical attacks is also done with the threat of the information leaked .
REFERENCES Books and journals ï‚´Bertino, E. and Islam, N., 2017. Botnets and internet of things security.Computer.(2). pp.76-79. ï‚´Brotby, W.K. and Hinson, G., 2016.Pragmatic security metrics: applying metametrics to information security. Auerbach Publications. ï‚´Das, A. and Khan, H.U., 2016. Security behaviors of smartphone users.Information & Computer Security. 24(1). pp.116-134. ï‚´Green, M. and Smith, M., 2016. Developers are not the enemy!: The need for usable security apis.IEEE Security & Privacy. 14(5). pp.40-46. ï‚´Ingram, A., 2016. Spaces of security and insecurity: Geographies of the war on terror. InSpaces of Security and Insecurity(pp. 15-32). Routledge.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.