Monday, August 12, 2019

IT security threats Research Paper Example | Topics and Well Written Essays - 250 words

IT security threats - Research Paper Example and controls and has less privileged access to users of the sensitive information systems (Silowash, Cappelli, Moore, Trzeciak, Shimeall and Flynn, 2012). The other threat to information technology is the threat of credit card fraud which leads to unauthorized use of a credit card (Turban and Volonino, 2011). Some of the potential solutions includes avoiding to give out the credit card but rather opt to enter the credit card number on a secure online order, avoiding to disclose credit card number and other details on websites that are not secure or on emails, avoiding to leave the credit cards and other receipts that contain the credit card details lying around or even writing of PIN number where it can be easily found (http://www.scambusters.org/CreditCardFraud.html). Other than the above two threats, Microsoft provides other threats like spoofing and tampering mainly conducted by cyber criminals and spies. In order to prevent or stop these threats, installing backups regularly, coming up with more tough and complicated configurations that will not be easily broken into and installing firewalls are some of the basic security precautions people and organizations should make (Springer, 2010). Silowash, G., Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T. and Flynn, L. (2012). Common Sense Guide to Mitigating Insider Threats, 4th Edition (CMU/SEI-2012-TR-012). Retrieved January 24, 2013, from the Software Engineering Institute, Carnegie Mellon University website:

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.