preview

Information Security, Minor Assignment

Best Essays

ITECH 3215
INFORMATION SECURITY
MINOR ASSIGNMENT
THREAT PROFILING
VIVEK CHARY DADUVAI (30312832)
Contents
Summary 3
Introduction 3
Profile of Threat 3
Profile Completion 4
Situational crime Prevention 4
Law 6
International scope 6
Conclusion 7
Reference 8

Summary
Computer security is the security applied to the computers and their networks including the internet. Physical security and information security are the two types of computer securities which prevent theft of equipment and data. (Man, 2015).
Security vulnerabilities can be defined as an unintended flaw in the system that leaves opportunity for unauthorized access of malicious software such as viruses, Trojans, worms and other malwares. It can result from bugs in software and weak passwords. These require fixes in order to prevent the integrity of the system compromised by hackers or malwares. Hackers try to steal sensitive data such as corporate or personal information.
Introduction
The most common operating system, Microsoft Windows is used to connect the systems to the internet and hence contains various vulnerabilities. Internet Explorer, MS-SQL, file serving and message processing services are the most commonly exploited services of the operating system. There is no operating system that does not contains vulnerabilities and exposures and cannot be targeted by the hackers and viruses. The vulnerabilities in Windows are more popular because of the huge number of machines running it. (Zibstev

Get Access