Advertisement
Guest User

poster information

a guest
Apr 23rd, 2014
37
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.75 KB | None | 0 0
  1. Natural disasters
  2. Natural disasters are hard to predict as they are mainly caused by unpredictable weather such as heavy floods, thunder and fire. If these types of disasters were to hinder an organisation. If an organisation goes down for just one day they can lose out on hundreds and thousands as well as millions depending on the organisation. If client’s information is lost, organisation can find legal action taken against them. It’s important that we consider all the possible ways in recovering from a natural disaster. A plan would need to be in place to ensure all members of staff know how to deal with a situation like this.
  3. Soon as a disaster occurs data should be backed up to an external server or servers as the more locations data is backed up the more secured data will be. It’s in the best interest of an organisation to have documentation on hand which consists of answers to how to deal with natural disasters. Documentation will need to be used when logging disasters to when it happened and how it was fixed. Along with staff knowing their hardware and being able to keep a record of every step if a disaster were to occur.
  4.  
  5. The Data Protection Act 1998
  6. Data Protection Act is a protection of personal data. The Act focuses around how data is found, how it is used and how it is stored. An example related to the Data Protection Act is, not just organisations can commit crimes when dealing with data. Not protecting data can lead to employees selling data or manipulating data to other businesses, which is against the law unless they have permission. What we know is that Data may only be used for the specific purposes for which it was collected. And the act creates rights for people who hold that data.
  7. Cyber terrorism
  8. Is the threat to Cyber terrorism real?
  9. Even before 9/11, a number of exercise identified apparent complications in the computer networks of the U.S. military and energy sectors. After 9/11. the security and terrorism disclosure soon featured cyber terrorism developing due to political reasons.
  10. Cyber terrorism is by far more attracted to modern terrorists who value its potential. its potential to cause harm to others.
  11. Malware
  12. Malware is known its malicious software, which is software that affects a computers behavior. The software can allow hackers to access other computer systems or even find ways to gain access to private information such as financial details. Malware ranges from worms, Trojan horses and key-loggers.
  13. Software that helps prevent these attacks is known as anti-virus or anti-malware which prevent attacks and blocks incoming threats to harms ones computer.
  14.  
  15.  
  16. References
  17. Ahmad and Yunos, (2012) A Dynamic Cyber Terrorism Framework. International Journal of Computer Science and Information Security, 10(2), p.149
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement