logo

Security Threats to Organization

   

Added on  2022-08-11

5 Pages1156 Words22 Views
Running head: PHYSICAL SECURITY
PHYSICAL SECURITY
Name of the Student:
Name of the University:
Author Note:

PHYSICAL SECURITY1
Security threats to organization
Security threat to an organization is malicious act which aims in corrupting or stealing
data or could disrupt systems of an organization. Security event is occurrence in where network
or data might be exposed. Such an event which results in network or data breach is termed as
security incident. As threats of cybersecurity continue in evolving and turn to be more
sophisticated, IT should be vigilant when this is about protecting the networks or data. All
organizations are aware of security’s importance: security of building, financial security and
security of the employees are all essential (Kalaiprasath, Elankavi & Udayakumar, 2017).
However, several other assets are comprises by the organizations which need security for their IT
infrastructure. Network of organization is lifeline which employees depend on for doing their
jobs as well as make money subsequently for their organization. Hence, it is essential in
recognizing that IT infrastructure is essential asset which needs top security.
Over past decade, number of threats of system security has soared. As professionals of IT
scramble in staying abreast of latest issues to secure their organizations’ environment, they
should navigate increasingly complicated field. Data could be of sensitive type. Data is most
essential part for the organizations. For protecting data of the organizations, security threats
should be understood first. Few of the major security threats which IT team should counter are
insider threats, worms and viruses, botnets, attacks of drive-by download, phishing attacks,
DDoS attacks, ransomware, exploit kits, attacks of advanced persistent threats and malvertising
(Woldemichael, 2019). Few of the most crucial threats are as follows:
Insider threats: It takes place when the individuals who are close to organization have
access to network, misuse it unintentionally or intentionally for negatively affecting

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Worm Attack: Types, Impact, and Prevention Measures
|11
|1984
|483

IS Security and Risk Management Assignment PDF
|10
|3410
|84

Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

Report on Recent and Current Trends in Malware
|13
|2836
|266

Assignment on Risks and Risk Management
|11
|781
|13

Malware: A Threat to Corporate Organizations
|8
|1336
|400