Saturday 1 February 2020

Risks to Information Systems

What are the risks to Information Systems? When data is in physical form, the common risk might theft or damage from the physical location, but when data is converted in electronic form data is vulnerable from many sources this is illustrated from the diagram below

  There are threats from people, malware , virus, worms etc.. we shall see some of the most common risks to Information Systems. Most Information systems are web based, we can classify the threats from various points of access like 
  • Client Side
  • Communication Network
  • Corporate Servers
  • Corporate Systems




Risk 1: Unauthorized Access
One big security issue is people who are not authorised to access a system getting access to it, it can be due to bad or no password or even theft of password or devices

Risk 2: Internet Vulnerabilities

Due to current practices of having 24/7 internet for all devices, hackers find it easier to target a corporate network, also file sharing and multiple personal devices connected means more unregulated downloads and more unauthorized applications are installed. these cause even more vulnerabilities.

Risk 3: Wireless Security Challanges:

The prevalance of wireless networks made illegal access of networks much easier, with a simple SSID or public WiFi networks hackers can inject malicious codes into secure devices. So companies always advice their personnel never to use public WiFi networks.

    Risk 4: Malicious Software:
Malicious software can be called in various names
  • Virus - self replicating malicious code
  • Worms - self replicating and self spreading malicious codes
  • Trojan - malicious code hidden under a different application
  • Spyware - software designed to spy on the users systems
  • Keylogger- software used to record all keyboard strokes
  • SQL Injection Attacks - adding malicious codes into the network using websites poor coding.
Risk 5: Hackers and Crimes

  •  Spoofing and Sniffing
  •  Denial Of Service
  • Identity Theft
  •  Cyber terrorism and Warfare
Risk 6: Internal Threats
  •  Software Vulnerability
  •  Employees
Most ignored threat is the internal Threats by employees and software vulnerability, most companies use obsolete software and this gives many opportunity for hackers. also employees who have a grudge sometimes keep Logic Bombs or deactivate security system or steal and sell data.

These are some of the major risks to Information systems



1 comment:

  1. Thank you for sharing informative information with us, its very helpful. learning management system
    Meetmonk's LMS is a cloud-based Learning Management System (LMS) designed for educational institutions. It offers features such as course creation, user management, assessments, and reporting. The platform is customizable and allows for integration with other applications. It also provides real-time analytics and supports various formats for content delivery, including video, audio, and documents. LMS.meetmonk.com is accessible from any device and provides a seamless user experience.

    ReplyDelete