IT Security Threats, Procedures, and Risk Assessment for Tesco

Verified

Added on  2023/01/19

|8
|719
|47
Report
AI Summary
This report provides an overview of IT security threats faced by Tesco, including computer viruses, botnets, spam, and worms. It details the security procedures implemented by the organization to mitigate these threats, such as hardware and software controls and security policies. The report also outlines a method for assessing and treating IT security risks, including identifying threats and threat modeling. Furthermore, it discusses the role of a trusted network, particularly mobile security, in the overall IT security framework. The document highlights the importance of protecting sensitive information from data breaches and physical attacks. The report concludes with a list of relevant references, including books and journals that support the analysis. This analysis serves as a comprehensive guide to understanding and managing IT security challenges within a large retail environment.
Document Page
IT SECURITY
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P1 Kinds of security threats of Tesco
Computer viruses- Computer viruses are the pieces of the software that able to design so
that it can be spread from one computer to other computer . As per the statistics 33% of
household computers over elaborate with some kinds of malware, more than half of them
are viruses.
Botnets- It can be used regarding anything from targeting the attacks on the servers, so that
to able to run spam email campaigns. Botnets included many computers ,as it finds
difficult to stop for many businesses.
Document Page
CONT..
Spam -Everyone is familiar with the Spam as the junk emails tends to squeeze businesses
servers as well as annoy recipient all across the organization. Spam becomes a threat for
the computer security as it contains harmful links, also overload the mail server as well as
distribute additional spam
Worms -Jiggling is considered as its way into network. It is a worm that is deployed to
the self replicate from one computer to the another. The only thing makes it differ from the
virus is that it needed no user interaction to get spread. According to this software hat is
applied within large quantities for a short duration of time.
Document Page
P2 Security procedures of the Organization
It is considered as the detailed step by step instructions on implementing ,security controls
list from the Tesco's security policies.
It should cover the hardware as well as software components that assists the process of the
business and security related business procedures. Such as Onboarding of a new staff
member.
Security policy also refers to the well-defined plans, rules as well as regulations systems
that access the Tesco's system as well as information included in it.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P3 A method to assess as well as treat IT security risks
Identify Threats – It depends on the various assets or information that has been compromised
such as Tesco's data center located within a region where there are environmental threats such
as Floods.
Are the industry are becomes more actively targeted as well as hacked by a Known crime
syndicate or the policy of the government.
Threat modeling is considered as the crucial activity that assists risks to know the threats as
well as various ways as these threats can causes risks so that it causes risk to realized through
the exploiting vulnerabilities. Such as finance risk, it can be managed by making of the budget
Document Page
P4 Trusted network becomes a part of an IT security how
Trusted network such as Mobile security is considers as the top of the worry for the
company. As all the workers of the Tesco frame used the Smartphones ,as they also access
corporate data from the mobile phones as well as this means that keep of the sensitive
information into the wrong hands within an intricate puzzle.
As it considers higher than ever . It is easy to focus on the malware of this type as mobile
malware infections are becomes incredible common within the real world Data breaches
incidents and many physical attacks is also done with the threat of the information leaked .
Document Page
REFERENCES
Books and journals
Bertino, E. and Islam, N., 2017. Botnets and internet of things security. Computer. (2).
pp.76-79.
Brotby, W.K. and Hinson, G., 2016. Pragmatic security metrics: applying metametrics to
information security. Auerbach Publications.
Das, A. and Khan, H.U., 2016. Security behaviors of smartphone users. Information &
Computer Security. 24(1). pp.116-134.
Green, M. and Smith, M., 2016. Developers are not the enemy!: The need for usable
security apis. IEEE Security & Privacy. 14(5). pp.40-46.
Ingram, A., 2016. Spaces of security and insecurity: Geographies of the war on terror.
In Spaces of Security and Insecurity (pp. 15-32). Routledge.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
THANK YOU
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]