IT Security Threats, Research Paper Example

The essence of computer security rests upon confidentiality, availability, and integrity (Dahbur et al, 2012, p.77). A threat is a probable breach of security of the computer system. These threats originate from individuals who aim to acquire information from an organization or limit the operations of the business by interfering with the operations of the organization. The potential of the breach necessitates action to guard against its occurrence. The attackers usually have goals and use methods aimed at exploiting the vulnerabilities of the system.

Security threats can be human or because of nature. Natural threats cannot be predicted, or avoided, and safeguards can be put in place to decrease the harm. On the other hand, human threats are either malicious or non-malicious. Non-malicious threats, although not as harmful as the malicious ones, need appropriate attention and result from ignorance of personnel operating the systems (Johnston & Warkentin, 2010, p.549). Malicious human threats present significant potential risk and originate from external hackers or malicious users. These attackers will have a goal, objective, as well as motive in attacking a system.

According to Dahbur et al (2012, p.80), there are four broad categories of these threats and include disruption, which involves the interruption or the prevention of correct operations perpetrated by the use of computer viruses. Usurpation involves the unauthorized control of the system or part of the system. Disclosure infers to the unauthorized access to information while deception implies acceptance of false data by the system. It is noteworthy that these threats are inventive and as such, they evolve constantly with the aim of annoying, stealing information or causing harm. It becomes critical to employ concepts that prevent attacks in order to avoid these.

Reference list

Dahbur, K., Isleem, M. R., & Ismail, S. (2012). A Study of Information Security Issues and Measures in Jordan. International Management Review. Vol. 8 (2), p71-82. 12p.

Johnston, A. C. & Warkentin, M. (2010). Fear appeals and Information Technology behaviors: An empirical study. MIS Quarterly. Vol. 34 (3), p549-A4. 22p.