Sign In
Not register? Register Now!
Pages:
2 pages/β‰ˆ550 words
Sources:
2 Sources
Style:
APA
Subject:
Creative Writing
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 7.2
Topic:

Information Systems Threats and their Negative Impacts

Essay Instructions:

follow instructions on the attached document

Essay Sample Content Preview:

Information Systems Threats facing Organizations
Name:
Institution:
Information Systems Threats facing Organizations
Security Threat
Description
What organizations can do to secure information from threat
Computer Virus
Computer viruses are segments of program codes that replicate themselves and attach to executable commands of the programs making them to act in undesired manners in accordance to the tasks the writer(s) of the codes have designated. Such unwarranted behaviors of programs can be witnessed when instructions of the host program are executed or on specified dates determined by the writer of the virus codes. Viruses are categorized as resident, variants, overwriting, stealth or polymorphic (Bishop, 2003).
Computer viruses cause damage that may be characterized by loss of data and or other resources or utilities. Another significant impact of viruses is the costly application of anti-virus mechanisms. This represents more than the financial aspect of cost since management and viruses affect operator effectiveness and efficiencies, predominantly, an organization suffers the costs of data processing overheads. Additionally, viruses affect the attitudes and morale of the workforce to engage in productive practice at the workplaces, mostly because of lost time and efforts. It is noteworthy to point out that as a long-term impact; viruses discourage the whole process of online communication and processing in instances where sufficient computer security measures are yet to be implemented (Brookins, 2004).
Example of a Computer Virus: An example of a computer virus is the ‘ILoveYou' virus that caused significant havoc over a decade ago. The virus attacked both the government and the private sector information systems and erased huge amounts of data; it also stole internet explorer passwords as well as sending itself to multiple online addresses, especially those involved in chat rooms.
Organizations have no choice but to install their computer systems with up-to-date anti-virus software that should constantly have the virus signatures updated.
In addition, companies ought to train their employees in safe usage of information systems to avoid and or minimize instances of virus infections. for instance, people should work within firewalls, refrain from downloading suspicious and un-scanned attachments and shun from installing programs from unknown or unreliable sources (Brookins, 2004).
Adware
 This form if intrusion is characterized by the appearance of advertisement windows on computer screens while monitoring user or operator activity at the same time. It is normally integrated into other application programs run by the user at no extra cost or low charge and normally takes the form of popup windows or bars in application programs. It is represented as an independent file that appears without express authorization of the user and is hard to remove except by specialized software.
Adware entail codes that facilitate the tracking of personal information like browsing history hence enabling advertisers or creators to determine the preferences of users.
<...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!