KEMBAR78
Cape Notes Unit 2 Module 3 Content 3 | PDF | Computer Virus | Security
0% found this document useful (0 votes)
8 views3 pages

Cape Notes Unit 2 Module 3 Content 3

The document outlines the threats and vulnerabilities posed by Information Technology System components to organizations, including risks from the Internet, malware, and employee actions. It defines key terms such as threats, vulnerabilities, countermeasures, and types of attacks, detailing examples like adware, spyware, and viruses. Additionally, it discusses the implications of encryption and the challenges of disposing of obsolete equipment, emphasizing the need for effective countermeasures to protect organizational integrity.

Uploaded by

EMMA SLAY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views3 pages

Cape Notes Unit 2 Module 3 Content 3

The document outlines the threats and vulnerabilities posed by Information Technology System components to organizations, including risks from the Internet, malware, and employee actions. It defines key terms such as threats, vulnerabilities, countermeasures, and types of attacks, detailing examples like adware, spyware, and viruses. Additionally, it discusses the implications of encryption and the challenges of disposing of obsolete equipment, emphasizing the need for effective countermeasures to protect organizational integrity.

Uploaded by

EMMA SLAY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Syllabus Focus: Unit 2 Module 3 Content 3

Specific Objective 3: explain how Information Technology System components can be threats,
vulnerabilities, counter measures, attacks and compromises to organizations;

Content: For example, threats posed by the Internet, such as by providing access to the Internet
to employees the organization is exposed to lawsuits, viruses and hacking; encryption as a two-
edged sword; difficulties experienced by organisations in the disposal of obsolete equipment.

Threat

This is defined as an expression of intention to inflect evil, damage or injury.

Vulnerable

In computer security, the term vulnerability is applied to a weakness in a system which allows
an attacker to violate the integrity of that system. Vulnerabilities may result from weak
passwords, software bugs, a computer virus or other malware, a script code injection, a SQL
injection or misconfiguration.

Countermeasures

A defense counter measure used to prevent and exploit from being successful.

Counter Attacks

Counter attacks are techniques involving simultaneous blocking and retaliation, usually aimed
at vulnerable pressure points in your system.

Employees can expose the organization to lawsuits

Types of threat
• Adware
Programs that secretly gather personal information through the Internet and relay it back to
another computer, generally for advertising purposes. This is often accomplished by tracking
information related to Internet browser usage or habits.
Adware can be downloaded from Web sites (typically in shareware or freeware), email
messages, and instant messengers. A user may unknowingly trigger adware by accepting an End
User License Agreement from a software program linked to the adware.
• Dialers
Programs that use a system, without your permission or knowledge, to dial out through the
Internet to a 900 numbers or FTP site, typically to accrue charges

CAPE NOTES Unit 2 Module 3 Content 3 1


• Hack Tools
Tools used by a hacker to gain unauthorized access to your computer. One example of a hack
tool is a keystroke logger -- a program that tracks and records individual keystrokes and can send
this information back to the hacker.

Hoax
Usually an email that gets mailed in chain letter fashion describing some devastating, highly
unlikely type of virus. Hoaxes are detectable as having no file attachment, no reference to a third
party who can validate the claim, and by the general tone of the message.
• Joke Programs
Programs that change or interrupt the normal behavior of your computer, creating a general
distraction or nuisance. Harmless programs that cause various benign activities to display on
your (for example, an unexpected screen saver).

Remote Access
Programs that allow another computer to gain information or to attack or alter your computer,
usually over the Internet. Remote access programs detected in virus scans may be
recognizablecommercial software, which are brought to the user's attention during the scan.
• Spy ware
These are stand-alone programs that can secretly monitor system activity. These may detect
passwords or other confidential information and transmit them to another computer.
Spy ware can be downloaded from Web sites (typically in shareware or freeware), email
messages, and instant messengers. A user may unknowingly trigger spy ware by accepting an
End User License Agreement from a software program linked to the spy ware.
• Trojan Horse
A program that neither replicates nor copies itself, but causes damage or compromises the
security of the computer. Typically, an individual emails a Trojan horse to you-it does not email
itself-and it may arrive in the form of a joke program or software of some sort.
• Virus
A program or code that replicates; that is, infects another program, boot sector, partition sector,
or document that supports macros, by inserting itself or attaching itself to that medium. Most
viruses only replicate, though, many do a large amount of damage as well.
• Worm
A program that makes copies of itself; for example, from one disk drive to another, or by
copying itself using email or another transport mechanism. The worm may do damage and
compromise the security of the computer. It may arrive in the form of a joke program or software
of some sort.

Two threats or vulnerability and a counter measure an how it affect the organization

Cell Phones
To video the office e.g. .sensors, locks etc.
Pretending to be on the phone talking to someone.
Comprise-The person who wants to harm the company know where the locks and security are.

CAPE NOTES Unit 2 Module 3 Content 3 2


Attacks
Singled out/picked on eg.
Digicel try hack to the system on put in to get credit pay millions of dollars on there security
system.

Encryption
Is the double edge code –encryption money to family and you forgot the encryption code

Disposal
Can’t scrap them.
It has an effect on the society and May the company (brand)

CAPE NOTES Unit 2 Module 3 Content 3 3

You might also like