Insight Mission World Forum



Join the forum, it's quick and easy

Insight Mission World Forum

Insight Mission World Forum

Would you like to react to this message? Create an account in a few clicks or log in to continue.
Insight Mission World Forum

To facilitate balanced growth of Muslim generation culturally, morally, intellectually and spiritually, to become holistic and insightful in serving the cause of their Creator.


    information technology(security treat and risk)

    avatar
    Afolabi Wasiu


    Posts : 25
    Join date : 2013-11-20

    information technology(security treat and risk) Empty information technology(security treat and risk)

    Post by Afolabi Wasiu Fri Dec 06, 2013 1:47 am

    INTRODUCTION TO SECURITY AND RISK
    -Security threats
    -types of threat security
    -potential threat
    -viruses, worm, and Trojan horse
    -conclusion

    Security threats are threats possible danger that might exploit a vulnerability to breach security and thus cause possible harm.
    There are two types of security threat namely physical and data security threats.
    Physical threat can be classified in different forms like, theft, damage or destruction of the computer.
    Data threat can also be classified as follows, removal, corruption, denial of access, unauthorized access, theft of information.
    There are some potential threat than occur also to our computer security, and they are mainly classified into two which are; external threat and internal threat.
    External threat is the one through which outside users can easily attack in an unstructed and destructive way
    Internal threats are those done by employees maliciously or accidentally.
    There are also viruses, worms and trojan horses that are used to attack a computer system.
    Viruses are computer softwares that are created by an attacker. These viruses usually collect sensitive information to alter or destroy information .
    Worm is a self-replicating program that uses the network to duplicate its code to the host on the network.
    Trojan horses is technically a worm and is named for the ability of getting past computer defences by pretending to be something useful.
    There are also spams and pop-up windows, spams are unsolicited emails which can be used to send harmful links or deceptive contents, while pop-ups are windows that automatically open and one designed. To focus on the attention, and it leads you to advertising sites.
    Because of these, there are some security policy which are usually observed and these are; what assets require protection, the possible threat and should be done in the event of security breach.

      Current date/time is Fri Apr 26, 2024 6:35 pm