In this age of information technology, people can easily access information by just a click of a mouse. This ease of information access both has its advantages and disadvantages. Knowledge used for good purposes is a good thing but among the disadvantages are the seven identified threats that I’ll mention below:
1. MALWARE MENACE
Malware aims to infiltrate a computer without the owner’s consent leading to, capturing of passwords, replacement of vital system executables and control key functions via rootkits and an array of other viruses, worms and Trojan horses (among other things).
2. ATTACKS ON WEB BROWSERS / HOSTILE EMAIL ATTACHMENTS
Web browsers and emails are convenient targets and are the easy way in for thieves into an organization. For example, thieves may use pop-up ads to indicate that a computer is infected with malware and a link to download a program to fix it. Only, instead of fixing it, the “fix” contains an malicious code that does more damage than good. Spam emails containing potentially dangerous links and messages are also an example of this problem.
3. SQL INJECTION ATTACK
SQL injection attacks allow attackers to insert malicious codes into strings that are passed to a SQL server via an SQL injection that corrupts the application layer of a website. This allows the thieves to vandalize pages, steal credit card and other data and manipulated databases.
4. CONFIGURATION MANAGEMENT / PC LOCKDOWN
People usually focus on attackers outsde the organization but there is also a internal risk involved like when employees, contract workers, consultants and others gain access to systems that they are not entitled to use or when information is shared with those who are not authorized to view them.
5. PASSWORD ISSUES
Passwords allow users to use and enter into a system – and a compromised password could create lots of potential problems. Passwords should be confidential, strong and hard to guess. In addition, there should be some type of authentication technology that offers the advantage of knowing who’s logged into a system.
6. WIRELESS SECURITY
Thieves can gain access to valuable information by hacking into unsecured Wi-Fi connection, gaining access to mobile devices utilizing the wireless connection or capturing data over the air.
7. LOSS OF MOBILE DEVICES
Some organizations allow employees to store data in mobile devices. Unfortunately, researches show that about 10% of notebooks and other mobile devices end up lost or stolen – and over 95% of them are never recovered.