1,495
8
Essay, 2 pages (300 words)

It security essay

IT Security & EthicsThere are several threats to a company’s confidential information in today’s business world that needs to be protected. The first threat is hacktivism, this is where a person or team of people hack into a company’s confidential data and then posts the data on the Internet in order to make a political or social statement.

The next threat is cyberterrorism this is where an individual or group use the Internet to attack an individual’s, organization’s or country’s computer systems. Finally, the last threat is information warfare this threat is when an individual or group use information to gain an advantage over a competitor, country, or organization. Hacktivism, Cyberterrorism, and Information warfare can cause a company to lose their customers and even cause the company legal or financial issues to fix. However, there is several security counter measure that a company can take in order to avoid these threats like: firewalls, encryption, anonymity tools, antivirus, and antispyware. 1.

Concepts of Hacktivism, Cyberterrorism, and Information Warfare. HacktivismThis threat can cause a company to lose their reputation if confidential information is leaked and posted to the Internet because their customers will lose their trust in the company. For example, the company that I work for is a retail pharmacy and they are responsible for maintaining their customers private information. So if an individual or group hacks our computer systems and posts confidential information in order to make a political or social statement against my company it will not only cause them to lose their customers but it will also create severe legal issues that could destroy the company. CyberterrorismCyberterrorism can also be when an individual or group targets an organization, or country by planting a computer virus that will cripple their systems.

In my line of work, there is serious threat for a computer virus to destroy or copy customer information for an…

Thank's for Your Vote!
It security essay. Page 1
It security essay. Page 2
It security essay. Page 3

This work, titled "It security essay" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'It security essay'. 11 January.

Reference

AssignBuster. (2022, January 11). It security essay. Retrieved from https://assignbuster.com/it-security-essay/

References

AssignBuster. 2022. "It security essay." January 11, 2022. https://assignbuster.com/it-security-essay/.

1. AssignBuster. "It security essay." January 11, 2022. https://assignbuster.com/it-security-essay/.


Bibliography


AssignBuster. "It security essay." January 11, 2022. https://assignbuster.com/it-security-essay/.

Work Cited

"It security essay." AssignBuster, 11 Jan. 2022, assignbuster.com/it-security-essay/.

Get in Touch

Please, let us know if you have any ideas on improving It security essay, or our service. We will be happy to hear what you think: [email protected]