logo

IT Security: Potential Threats, Organizational Impact, and Security Framework

   

Added on  2023-06-04

6 Pages1110 Words302 Views
Running Head: IT SECURITY
Name of the Student
Name of the University
Author Note

1IT SECURITY
Introduction
The report mainly discusses on proposing the better IT security in Belsure Company. The
Belsure has been a recent launched ICT company who has been looking for a flourishing and
a profitable future. The company unaware of the threats and security risk wanted to create a
security plan in order to encounter these threats1 and provide better understanding about the
basics of the organization.
Potential Security Threats
The potential security2 that are faced by the organisation are given by the organisation are as
follows:
Malicious damage:
1. Shoulder surfing: the internal breach in an organisation through shoulder surfing and
piggybacking. The data breach can cause minimal damage to major damage. The
shoulder surfing is said to be done when the details or data of one user is used by
another user without permission. Example: Facebook access through others
passwords,
2. Hacking: the unauthorised access to any data, the company can face this threat
externally or internally. The damage can just be small password to huge sensitive data
and information that can hamper organization effectively. Example: Game of thrones
hacking.
1 Roman, Rodrigo, Javier Lopez, and Masahiro Mambo. "Mobile edge computing, fog et al.: A survey and
analysis of security threats and challenges." Future Generation Computer Systems 78 (2018): 680-698.
2 Beberlein, L. T., G. Dias, K. N. Levitt, B. Mukherjee, and J. Wood. "Network attacks and an Ethernet-based
network security monitor." (2017).

2IT SECURITY
3. SQL Injection: the malicious code if injected can abruptly damage the application and
the database. Example: SQl payload injection
4. Identity theft: Using the others id to access any sort of data is called identity theft.
Example: the financial data loss in banks through sensitive data breach.
Threats related to E Commerce:
1. Cloud breach: the data breach that occurs through unauthorised access of the
information that is store in the cloud. The cloud breach is the worst threat that can
hamper the organization. Example: Uber data breach causing damage of 100
2. Ransom ware: The ransom ware is the malware that gain access to the system or the
application and denies the services to the user until the one pays a ransom. Example:
WannaCry.
3. Counterfeit Goods: The goods that are not bought through the authorised access of the
system are highly prone to the security threats the system may contain the viruses ,
malware or worms that could hamper the computer system or can cause breach to the
system.
Organizational impact:
The organizational impact can be caused by security issue can be minor as well as major the
data breach can disrupt or misused to the system to potentially damage the organization.
There have been recent cases like uber cloud bleed and wannacry that have shown that there
is not just loss of data but also the physical harm and loss of life. The hacking and data breach
have incurred a huge loss to finance as well. The ransom ware just denies the access, but
there can be chances that leaking of sensitive information.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on CYBER SECURITY: WannaCry Attack
|12
|2488
|20

Cyber Security Breaches: Types, Prevention and Recommendations
|9
|1902
|143

Cloud Computing and Security Issues
|7
|1432
|40

Role of Cyber Security for Continuity of Business | Assignment
|7
|1390
|191

Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227

Computer Security: Fundamentals, Examples, and Countermeasures
|15
|5240
|98