CIS341 Technical Project Paper: Information Systems Security Week 10 Technical Project Paper

Research on security measures in information systems.

Zoe Jordan
Contributor
4.5
57
5 months ago
Preview (3 of 8 Pages)
100%
Purchase to unlock

Loading document content...

Preview Mode

Sign in to access the full document!

CIS341 Technical Project Paper: Information Systems Security Week 10 Technical Project Paper

Page 1

Week 10 Technical Project Paper Technical Project Paper: Information Systems Security CIS341 In the context of Information Systems Security, discuss the potential physical threats that organizations must address to safeguard their systems. Identify and explain at least five physical threats, elaborating on their impact on security and the necessary precautions organizations can take to mitigate these risks. Additionally, consider how the use of proactive measures such as email security and vulnerability assessments can contribute to improving overall security. Your response should be a minimum of 1,000 words, integrating real - world examples where applicable.

Page 2

Page 3

Identify at least five (5) potential physical threats that require attention. Potential Physical Threats includes nuisances such as spyware. Spyware allows hackers to track our every move via computer as well as some other electronic devices like viewing our passwords. There are several different types of setups for example consumers get tricked into accidentally downloading malware. They click a website or try downloading what they think is free software, which is called a botnet. Botnet is a jargon term for a collection of software robots, or bots that run autonomously and automatically. The term is often associated with malicious software but its also referred to the network of computers using distributed software. The second potential physical threat I selected is Viruses and/or Worms. If a virus hits it’s always bad news. A virus can copy itself and infect other machines without the user even knowing that the machine has been infected until disaster strikes. If a virus hits the network then it’s likely to propagate to files on other machines that are connected to the network. Viruses can also spread via email, instant messaging, an intranet and other shared networks causing networks and machines to overload or crash . They can also capture keystrokes, which is where the problem of security lies because passwords and banking details can be revealed in this manner. Viruses can cause major security risks and start a cycle of problems for an organization. Implementing an anti - virus solution can save your network and all your files and emails that could easily be lost and corrupted. Software programs that are designed to invade your computer and copy damage or delete your data. Worms are self - contained programs that spread you through a computer network by exploiting security holes. They also inflict idle workstations on the network. The difference between viruses and worms is that worms tend to exist in memory and are
Week 10 Technical Project Paper Technical Project Paper: Information Systems Security CIS341 In the context of Information Systems Security, discuss the potential physical threats that organizations must address to safeguard their systems. Identify and explain at least five physical threats, elaborating on their impact on security and the necessary precautions organizations can take to mitigate these risks. Additionally, consider how the use of proactive measures such as email security and vulnerability assessments can contribute to improving overall security. Your response should be a minimum of 1,000 words, integrating real - world examples where applicable. Identify at least five (5) potential physical threats that require attention. Potential Physical Threats includes nuisances such as spyware. Spyware allows hackers to track our every move via computer as well as some other electronic devices like viewing our passwords. There are several different types of setups for example consumers get tricked into accidentally downloading malware. They click a website or try downloading what they think is free software, which is called a botnet. Botnet is a jargon term for a collection of software robots, or bots that run autonomously and automatically. The term is often associated with malicious software but its also referred to the network of computers using distributed software. The second potential physical threat I selected is Viruses and/or Worms. If a virus hits it’s always bad news. A virus can copy itself and infect other machines without the user even knowing that the machine has been infected until disaster strikes. If a virus hits the network then it’s likely to propagate to files on other machines that are connected to the network. Viruses can also spread via email, instant messaging, an intranet and other shared networks causing networks and machines to overload or crash . They can also capture keystrokes, which is where the problem of security lies because passwords and banking details can be revealed in this manner. Viruses can cause major security risks and start a cycle of problems for an organization. Implementing an anti - virus solution can save your network and all your files and emails that could easily be lost and corrupted. Software programs that are designed to invade your computer and copy damage or delete your data. Worms are self - contained programs that spread you through a computer network by exploiting security holes. They also inflict idle workstations on the network. The difference between viruses and worms is that worms tend to exist in memory and are

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Related Documents

View all