It Disaster Recovery and Business Continuity Plan

Submitted by: Submitted by

Views: 108

Words: 524

Pages: 3

Category: Business and Industry

Date Submitted: 05/21/2014 08:27 AM

Report This Essay

IT Disaster Recovery and Business Continuity Plan

Name:

Institution:

IT Disaster Recovery and Business Continuity Plan

Types of Cyberterrorism and Security Threats

Currently, widespread adoption of information technologies is exposing enterprises to many security threats, particularly cyberterrorism. Cyberterrorism refers to a deliberate attack on a computer system of an organization. Its poses are a serious threat to the information security of an organization (Jalil, 2003).

There are various types of cyberterrorism. The use of spyware represents one of the types of cybersecurity threats. It involves the use of malicious software that cannot be detected to obtain information from an organization’s information systems. Web vandalism is cyber terrorism. It involves the use of viruses to block an organization’s website from accessing crucial services or information. It may cause the websites to generate or retrieve inaccurate information that may be used to make wrong decisions (Jalil, 2003).

Propaganda is another form of cyberterrorism. Information may be gathered to influence or motivate hackers to attack the information system of an organization. Cyberterrorists may also launch a network-based attack on a corporate network. Its attack poses a high security threat to the enterprise because it denies employees and other network users access to critical information and services required to perform their job responsibilities. (Jalil,2003).

Sources of Cyberterrorism

An enterprise can face cyberterrorism threats from various sources. Competitors pose the greatest threat to an organization. It is because a disruption or paralysis of the plan’s operations would enhance their chances of increasing their level of profit. An enterprise also faces the threat of cyberterrorism from employees or other stakeholders with malicious intentions. For example, a malicious employee can launch a virus to manipulate computer systems for personal gains,...