Monday, 9 April 2018

IT Security Risks

By Qiqi & Mina

 Describe each security risk:

   (1)Unauthorized access:
  •  Accessing private accounts, messages or files without a permission from the owner.
  • Prevent: We can give a strong password to the account and the devices that we use.
  • Example: Hacking someone account.
   (2) Unauthorized use of a system:
  •  Use someone system without a permission from the owner.
  • Prevent: We can use private IP addresses so that people cannot access the system, such as provide new strong VPN to protect the identity.
  • Example: Reply people comments or messages using someone account.
   (3)Unauthorized removal or copying of data or code from a system:
  •  Someone that illegally copy people data then remove the data without a permission from the owner of the data.
  • Prevent: All the data must have copyright.
  • Example: Copy someone works from the website, that called plagiarism and remove it all she/he want.
   (4)Damage to or destruction of physical system assets and environments:
  • Someone that physically damage the systems assets and environments which can cause some devices can be stolen.
  • Prevent: Provide a strong password for the systems, and make a back up of the system.
  • Example: The computer of the office can be stolen .
   (5)Damage to or destruction of data or code inside or outside the system:
  • Someone that illegally accessing , making damages to someones data inside and outside the systems.
  • Prevent:Install quality anti virus and keep updating.
  • Example: Viruses that can cause lost of data.
   (6) Naturally occurring risk .
  • Natural disaster that can cause damages to the system.
  • Prevent: Use leak and flood sensors.
  • Example: Flood can cause damages to the computer system.

References:

MakeUseOf. (2017). Protect Your Electronics From Water With These 7 Steps. [online] Available at: https://www.makeuseof.com/tag/best-ways-protect-electronics-flooding/ [Accessed 10 Apr. 2018].

Canon.com. (2018). [online] Available at: http://www.canon.com/support/pdf/network-cameras.pdf [Accessed 10 Apr. 2018].












No comments:

Post a Comment