Summary of Information Systems Security
Anglų namų darbas. Security treats to Information Systems. Reducing the Threat to Information Systems.
Controls upon information systems are based upon the two main principles. The first principle states the need to ensure the accuracy of the data held by the organisation while the second principle is about the need to protect data against loss and damage. The most common threats are accidents, natural disasters, sabotage, vandalism, theft, hacking and computer viruses.
What is more, all information systems could be damaged by natural disasters, such as storms, lightning strikes, floods and earthquakes.
Another danger is sabotage. We could distinguish two types of sabotage: Individual or industrial sabotage. Individual sabotage is typically carried out by disgruntled employee who wishes to exact some form of revenge upon their employer. Thats is why employee cause deliberate damage to the organisation's information systems or circumvent security procedures in order to gain full access to an information system. Industrial sabotage tends to be carries out for some kind of competitive or financial gain.
There are several different types of computer virus. The link virus attaches itself to the directory structure of a disk. Parasitic viruses insert copies of themselves into legitimate programs, such as operating system. Macro viruses are created using the high-level programming languages found in e-mail packages, web browsers and applications software. All viruses, except anti-viruses must be considered to be harmful.