Security threats are vastly becoming an ongoing threat to the information technology world today. Constant threats involve viruses, hacking, worms, and malicious activity within the virtual world of an organization or individual computer systems. Within every organization there is threat of data loss. Whether the loss is unintentional or malicious. Many factors are attributed to data loss such as malware, computer theft, hacking, and network exposure, to name a few. This type of data loss not only affects organizations but individuals also. In addition, all types of data are vulnerable. Why? More and more employees rely on e-mail for business communications. Individuals and organizations use e-mail as a central filing system, which the bulk of their critical business information is stored. This dramatically increases the probability of leaking sensitive, (NPI) Non-Public Information, or confidential data (Ruggiero, 2011). When a recipient’s email address is misspelled or an incorrect key is pressed by an employee and a message containing confidential information in the wrong hands. This paper will review recent security threats to individuals and organizations that occur within and organization and individually.
Over the last 30 years the huge change in security threats has been the computing environment to change into interconnected smaller systems form large mainframes (Conklin, 2009). Attackers/hakers have evolved over the last 30 years as the computer age has also evolved. There are numerous automated tools to allow novice attackers to infiltrate any system. It is highly recommended security administrators run tools against their systems to see what attackers see (Conklin, 2009).
Every individual and organization is aware of security threats and how important it is to secure and protect its data. Not only its date, but also its surroundings, security of the building, its employees, and assets are, or should
References: Conklin, W. W. (2009). Principles of Computer Security. Chicago: McGraw-Hill. Weaver, D., Weaver, D., & Farwood, D. (2014). Guide to Network Defense and Counter Measures. Boston: Course Technoloy, Cengage Learning. Ruggiero, P. (2011) Threats to Mobile Phones, United States Computer Emergency Readiness Team, Pittsburgh, PA.