.

Friday, May 10, 2019

IT security threats Research Paper Example | Topics and Well Written Essays - 250 words

IT security threats - explore Paper Exampleand controls and has less privileged access to users of the sensitive nurture systems (Silowash, Cappelli, Moore, Trzeciak, Shimeall and Flynn, 2012).The other threat to information technology is the threat of impute lineup fraud which leads to unauthorized use of a credit card (Turban and Volonino, 2011). Some of the potential solutions includes avoiding to give out the credit card but rather opt to register the credit card soma on a secure online order, avoiding to disclose credit card number and other details on websites that are not secure or on emails, avoiding to leave the credit cards and other receipts that contain the credit card details lying around or even writing of PIN number where it can be easily found (http//www.scambusters.org/CreditCardFraud.html).Other than the supra two threats, Microsoft provides other threats like spoofing and tampering mainly conducted by cyber criminals and spies. In order to prevent or stop the se threats, installing backups regularly, coming up with more tough and complicated configurations that will not be easily broken into and installing firewalls are some of the basic security precautions people and organizations should make (Springer, 2010).Silowash, G., Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T. and Flynn, L. (2012). communal Sense Guide to Mitigating Insider Threats, 4th Edition (CMU/SEI-2012-TR-012). Retrieved January 24, 2013, from the Software Engineering Institute, Carnegie Mellon University website

No comments:

Post a Comment