IT Security Threats, Procedures, and Risk Assessment for Tesco

Verified

Added on  2023/01/19

|8
|719
|47
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
IT SECURITY
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
P1 Kinds of security threats of Tesco
Computer viruses- Computer viruses are the pieces of the software that able to design so
that it can be spread from one computer to other computer . As per the statistics 33% of
household computers over elaborate with some kinds of malware, more than half of them
are viruses.
Botnets- It can be used regarding anything from targeting the attacks on the servers, so that
to able to run spam email campaigns. Botnets included many computers ,as it finds
difficult to stop for many businesses.
Document Page
CONT..
Spam -Everyone is familiar with the Spam as the junk emails tends to squeeze businesses
servers as well as annoy recipient all across the organization. Spam becomes a threat for
the computer security as it contains harmful links, also overload the mail server as well as
distribute additional spam
Worms -Jiggling is considered as its way into network. It is a worm that is deployed to
the self replicate from one computer to the another. The only thing makes it differ from the
virus is that it needed no user interaction to get spread. According to this software hat is
applied within large quantities for a short duration of time.
Document Page
P2 Security procedures of the Organization
It is considered as the detailed step by step instructions on implementing ,security controls
list from the Tesco's security policies.
It should cover the hardware as well as software components that assists the process of the
business and security related business procedures. Such as Onboarding of a new staff
member.
Security policy also refers to the well-defined plans, rules as well as regulations systems
that access the Tesco's system as well as information included in it.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
P3 A method to assess as well as treat IT security risks
Identify Threats – It depends on the various assets or information that has been compromised
such as Tesco's data center located within a region where there are environmental threats such
as Floods.
Are the industry are becomes more actively targeted as well as hacked by a Known crime
syndicate or the policy of the government.
Threat modeling is considered as the crucial activity that assists risks to know the threats as
well as various ways as these threats can causes risks so that it causes risk to realized through
the exploiting vulnerabilities. Such as finance risk, it can be managed by making of the budget
Document Page
P4 Trusted network becomes a part of an IT security how
Trusted network such as Mobile security is considers as the top of the worry for the
company. As all the workers of the Tesco frame used the Smartphones ,as they also access
corporate data from the mobile phones as well as this means that keep of the sensitive
information into the wrong hands within an intricate puzzle.
As it considers higher than ever . It is easy to focus on the malware of this type as mobile
malware infections are becomes incredible common within the real world Data breaches
incidents and many physical attacks is also done with the threat of the information leaked .
Document Page
REFERENCES
Books and journals
Bertino, E. and Islam, N., 2017. Botnets and internet of things security. Computer. (2).
pp.76-79.
Brotby, W.K. and Hinson, G., 2016. Pragmatic security metrics: applying metametrics to
information security. Auerbach Publications.
Das, A. and Khan, H.U., 2016. Security behaviors of smartphone users. Information &
Computer Security. 24(1). pp.116-134.
Green, M. and Smith, M., 2016. Developers are not the enemy!: The need for usable
security apis. IEEE Security & Privacy. 14(5). pp.40-46.
Ingram, A., 2016. Spaces of security and insecurity: Geographies of the war on terror.
In Spaces of Security and Insecurity (pp. 15-32). Routledge.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
THANK YOU
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]