I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.
Malicious Damage:
Malicious damage occurs with most businesses, and they haven’t been easy to deal with either. There are at least 2 types of malicious that occur more often, they are worms and viruses, they both play a huge role when it comes to damaging a business …show more content…
these products do sell very quickly as they can have the same functions as the real ones, and the price of these goods/products could either be higher than usually due to a significant amount of modifications. This would obviously be going against the law they would look very alike but the differences are there, between the real product and the fake product. Downloading illegal films, or even the process of finding one does not consume much type, as there are system such as peer to peer for people to share with. For example a film website showing films that are pretty much up to date is very illegal, although they get shutdown, there is so many different film websites being opened pretty much every hour, and so the law does its best to make sure it doesn’t happen but as you can see, I do not assume they are helping in a major way.
Human Errors:
This is when a problem occurs caused by a person that can simply affect organisations and very hard to spot out a human error before it becomes a bigger problem, these errors caused by a person or a couple of people are more challenging as they are hard to see and predict the time there would be sayings and quotes all over social media such as Instagram, that have many human errors, where there are actual planned and executed human errors, in other words the theory of the human errors are much …show more content…
That is why most big businesses have hired individuals that do what hackers do, which is to find gaps or spaces in an organisations or a person’s security and report the problem or at least fix/repair the space before it gets into the hands of worse hackers, very similar as to what Uber has done recently, which was that they paid a couple of hackers to delete their own stolen data on 57 million people. This is against the law
Theft of Equipment:
This is a very common type of threat we see very frequently in our lifetimes, mostly by individuals. In terms of stolen data/ theft of data is done by hacking and the duration of their damage cannot be predicted for certain people or businesses. Things such as investment plans or architectural designs of a business can be spread over social media over the internet, competitors as well as business start-ups would be more than happy to know about this, and as you can imagine the damage of that cannot be predicted or estimate, when in relation to the period of that lasting damage.
Threats related to