Security Threat What can organizations do to keep their information secure from each threat?
• Description: Virus is software which is used to contaminate a computer. The virus code is hidden within an existing program and when that program is executed, the virus code is turn on and infects other programs in the computer and other computers in the network.
• Impact: The virus may be a trouble-free that pops up a message on screen out or it can destroy data in a minute or on a particular date.
• Example: The well-known Michelangelo virus infected the computers on Michelangelo's birthday. http://www.pcmag.com/encyclopedia/term/53963/virus
• Technology (software, hardware):
Anti-virus software (such as Norton, Panda, and AVG anti-virus) has to use in every organisation.
Hardware: Firewall is used both as software as well as hardware and this mechanism is used to protect a system from network attacks, by blocking all unused ports for the system's operational purposes.
Organizational strategies (policies, leadership, training, etc.) The development of information systems security policies regarding e-mail usage and the use of software is the first step. The policy puts into written form the organization’s emphasis on the proper use of e-mail and software installation.
Organisations must provide the training to the employees so they can understand the threat involved with the opening and downloading unknown emails and programs.
It is free software which is maintained by commercials.
Impact: Most adware is not dangerous to use. However some of them can act as spyware and can gather information from your computer and the visited Web sites you.
Example Web browser add-ons, like the Alexa toolbar.
Hardware: Firewalls can be helpful.
Organizational strategies (policies, leadership, training, etc.)
Training to the Employees so that they can make sure they really required a program before downloading it and for every download read licensing agreements. Beware of clickable advertisements.
• Description: Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner’s private information.
• Impact: Spyware can also affect the performance of computer negatively and steal user’s personal information.
Example : Keylogger(SpyAnytime),GATOR
Software: Anti-spyware Software is required to detect, block and remove spyware. However, some anti-virus software can be used to deal with Spyware.
Hardware: Firewall can also be helpful.
Organizational strategies (policies, leadership, training, etc.) ...