The advancements in information technology (IT) have raised concerns about the risks to data associated with weak IT security, including vulnerability to viruses, malware, attacks and compromise of network systems and services. Inadequate IT security may result in compromised confidentiality, integrity, and availability of the data due to unauthorized access. It is important to ensure the individual privacy remains carefully protected and secured.
What is information security threat? A threat is any circumstance or event with the potential to harm an information system can cause different types of damages that might lead to significant financial losses. The information security damages can range from small losses to entire information system.
…show more content…
It is a malicious codes, malicious programs or malicious software that can infiltrate or damage the computer. It can turn a computer in to a zombie, which is a machine that is controlled externally to perform malicious attacks. It often effects a large user population and harms their computer.
Malware always has a damaging function (called Payload) and has different effects. Malware can be classified into several categories which are Trojan horses, worms, viruses, and spyware. It is the most popular malware threat to the computer system.
Categories Of Malware Definition
Trojan Horses A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded.
Worms Unlike viruses, a worm does not attach itself to executable files. It spreads by transferring itself via networks or computer connections to other computers.
Viruses Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting computer, as well as the computers of everyone in the contact list.
Spyware Software that collects personal information without you knowing. They often come in the form of a ‘free' download and are installed automatically with or without your
…show more content…
Both threat using a different ways to gain the access of the information. Internal threat is a illegitimate access from an individuals from inside of the organization. It can be the employees, students, and contractor. The insider attack can be extremely difficult to detect or to protect against because they have legitimate access to the system. They know what they are searching for and somehow know how to retrieves and circumvent intrusion detection systems. Different for external attackers, they can be hackers/crackers, saboteurs and thieves. If the network is compromised, intruders can attack or misuse the system. One common technique used by intruders to gain unauthorized access to the system is password theft. That is why, the users should be aware of information security which by not simply sharing their password with others and not leave their computer unprotected. It will gives the opportunities for unauthorized