(855) 4-ESSAYS

Type a new keyword(s) and press Enter to search

E-business Security


An organization must also discern whether their employees have the proper knowledge to conduct the type of analysis needed to secure their information systems. .
             Threats:.
             There are three main threats involved in a secure system: Technical threats, unintentional threats and physical threats. The first category of threats is technical threats, which are also known as malicious acts. Probably the most widely known of these threats is called a virus. A virus is a piece of software that attaches itself to other software like a leech and is designed to attach itself to other applications that it is not intended for. If it is allowed to, it will keep moving through your computer attaching itself to any application it can gain access to. Viruses can affect anything from your home personal computer, personal digital assistants or even your cell phone. .
             Technical Threats: .
             A worm is another technical threat to a company's secure system. Worms are malicious programs that replicate themselves constantly without requiring another program to provide a safe environment for replication. (Whitman-Mattord, pg. 56) Worms, like viruses, can be prevented by implementing a firewall and limiting connectivity and downloads from the internet. A trojan horse can be a virus or a worm but it may also be a cookie which tracks what sites you visit and possibly user id's and passwords. A trojan horse is a piece of hidden software that is inactivate until the users themselves activate them. They can be hidden in shareware or readme.exe files. To prevent your system from a trojan horse, users must be educated about the dangers of running foreign programs. It is the management's job to make sure that users are informed and the must also frequently check file and program sizes.
             Time bomb's can also be a virus or a worm that is set to activate itself at a certain time or date. The bomb is given enough time to move its way through the whole system before activated.


Essays Related to E-business Security


Got a writing question? Ask our professional writer!
Submit My Question