Electronic Nature of Information Systems Case Study

Exclusively available on IvyPanda Available only on IvyPanda

The electronic nature of information systems makes them more prone to errors, abuse, and destruction. One reason for this is the network structure of the information systems. Networks consist of computers (clients and servers), that are connected with wires and wireless solutions. This fact makes them vulnerable to physical dangers such as fires, floods, hardware failure, etc. Computer issues are also common such as programming errors, faulty installation and unauthorized changes.

We will write a custom essay on your topic a custom Case Study on Electronic Nature of Information Systems
808 writers online

The majority of the danger, however, comes from the Internet. Any traffic circulating through the network can be intercepted during a hacking attack. This vulnerability comes from such communication services as E-Mail, instant messaging, and peer-to-peer networks. They can be used to spread malicious files even without the knowledge of the sender. Their traffic can also be intercepted for data gathering.

Another vulnerability comes from wireless networks such as Wi-Fi and Bluetooth. Free public Wi-Fi hotspots may use specialized sniffer programs that can access the resources of any computer on the network. These are the most common types of malicious software that is used to attack information networks. The first is basic viruses. They are programs specifically designed to execute malicious code without the user’s permission. Viruses often come hidden in Trojan programs that pretend to be legitimate software. The next type is worms.

They are independent programs that copy themselves to every computer on the network. Drive-by downloads are very common today. They install a virus in the background as the user installs a legitimate program or file. A new type of malware known as ransomware has been gaining traction. When executed it encrypts the files on the computer until the user transfers money in bitcoins to a specific valet. These and other types of attacks can be used for identity theft, theft of corporate secrets, denial of service attacks, and other malicious activity.

Print
Need an custom research paper on Electronic Nature of Information Systems written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2020, September 6). Electronic Nature of Information Systems. https://ivypanda.com/essays/electronic-nature-of-information-systems/

Work Cited

"Electronic Nature of Information Systems." IvyPanda, 6 Sept. 2020, ivypanda.com/essays/electronic-nature-of-information-systems/.

References

IvyPanda. (2020) 'Electronic Nature of Information Systems'. 6 September.

References

IvyPanda. 2020. "Electronic Nature of Information Systems." September 6, 2020. https://ivypanda.com/essays/electronic-nature-of-information-systems/.

1. IvyPanda. "Electronic Nature of Information Systems." September 6, 2020. https://ivypanda.com/essays/electronic-nature-of-information-systems/.


Bibliography


IvyPanda. "Electronic Nature of Information Systems." September 6, 2020. https://ivypanda.com/essays/electronic-nature-of-information-systems/.

Powered by CiteTotal, essay citation maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1