What are IT attacks? 3
Virus Attack 3
Spam Mail 4
Port Scanning 4
System Compromise 5
Website defacement 5
BACKING UP OF IMPORTANT FILES 6 Acts of Human Error of Failure 7 Deliberate acts sabotage or vandalism 7 Deliberate acts of theft 8 Deliberate software attacks 8 Forces of nature 8 Technical hardware failure 8 Technical software failure 9
References 9
Question 1:
What are IT attacks?
In computer, an attack is any effort to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. An attack usually is perpetrated by someone with bad intentions. The general term used to describe the category of software used to logically attacking computers is called malware. IT Security risk means that there might be unauthorized access to or theft of proprietary data. Common people often post their business email addresses on external websites. These can be picked up and used to hack into other corporate accounts or flood employee in-boxes with unwanted spam. Installing unlawful wireless access points also increases the risk that outside agents could hack into company servers. It also degrades the quality of the internal wireless local area network system, subsequently potentially resulting in lost productivity.
A Threat is a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could violate security and cause harm. That is, a threat is a possible danger that might develop defencelessness.
A threat can be either intentional (e.g., an individual cracker) or "accidental" (e.g., the possibility of a computer malfunctioning).
[pic] security threats
Virus Attack
A virus is a small piece of software that piggybacks on real programs. A computer virus is a computer program that can reproduce and stretch from one computer to another. Viruses can increase
References: Information Technology Risks | eHow.com http://www.ehow.com/info_7954636_information-technology-risks.html#ixzz1ngxCYJ2G http://ist.mit.edu/security/backup http://uwacadweb.uwyo.edu/DTC/ThreatList.asp http://www.utica.edu/faculty_staff/qma/needforsecurity.pdf http://webfuse.cqu.edu.au/Courses/2008/T1/COIT13211/Study_Schedule/tute09.htm