Threats to information security
Information
security threats include malicious software, stolen laptops or mobile devices,
unsecured wireless internet networks, phishing and intruder/insider employee
threat. Malicious software includes worms, spyware, viruses and Trojan horse.
The malicious software is secretly installed in the network or computers in the
organization and cause internal damage to information by deleting or corrupting
it. The malicious software extracts information such as passwords and other
sensitive information from the organization and uses this information for
financial gains such as extortion or theft (Sanchez,
2015). Malicious software scan also leads to the breakdown of the entire
computer network within the organization.
Stolen
mobile devices and laptops are another major threat to information security.
Once the laptops or the mobile devices have been stolen the information from
them can be accessed. Laptops hold valuable and sensitive information and,
therefore, leading to the theft of information (Teixeira,
2007).
Unsecured
wireless internet connections provide hackers with an open door to enter the
system. Hackers can easily enter the system through the wireless internet
network and steal valuable information regarding the organization, its clients
or its employees (Teixeira, 2007). The unsecured
network gives hackers and easy access the system from outside the organization
easily.
Phishing
is the process whereby e-mails are sent disguised to seem like those from an
authorized party in the attempt to gain confidential information such as
administrative passwords from employees in the organization (Sanchez, 2015). Once the employee feeds the password
to the link used in the e-mail, the hackers will immediately have the password
necessary to enter the system. The employees must, therefore, be educated to
understand the importance of protecting information from threats such as spear
poising sent through emails.
Outsider
or insider threat is also possible within the organization, outside parties may
enter the organization steal the mobile devices or load up information in
storage devices when not being monitored and walk away with it (Teixeira, 2007). Insider threats include disgruntled
employee who is more dangerous than a hacker since they have access to the
system and can delete or manipulate information at will causing damage to the
organization.
References:
- Sanchez, M. (2015). The 10 most common security
threats explained. blogs@Cisco - Cisco Blogs. Retrieved 25
October 2015, from http://blogs.cisco.com/smallbusiness/the-10-most-common-security-threats-explained
- Teixeira, R. (2007). Top Five Small Business Internet
Security Threats. Small Business Trends. Retrieved 25 October
2015, from http://smallbiztrends.com/2007/06/top-five-small-business-internet-security-threats.html
No comments:
Post a Comment