An Information System is vulnerable to a wide variety of threats to its
security.
| Physical |
The system and its data are susceptible
to physical damage from flood or fire and from theft and vandalism. |
| Document |
Documents within the system may be lost
or fraudulently altered. The data may be incorrectly copied from the
document |
| Personnel |
Personnel may have access to
inappropriate files or they may be able to copy or alter data in an
unauthorised way. Unauthorised individuals may have access to hardware and
data |
| Hardware |
The hardware is vulnerable to physical
damage and theft. It is also vulnerable to breakdown due to normal wear and
tear or to electrical spikes. |
| Communications |
The system may be vulnerable to hackers
or virus attack through a communications link. In addition lightening strikes
on network cable may damage computers linked to that cable. Data transmitted
through a network is particularly vulnerable to interception which is very
difficult to detect. |
| Software |
The software used by the system may
contain bugs or an employee or hacker may have altered it for fraudulent
purposes. |
| File |
Data stored in files is vulnerable to
unauthorised changes and unauthorised individuals can obtain confidential
information |
A large number of these threats and measures suitable for protecting
against them or their effects have been dealt with in other sections. We will
look at some of the operational and administrative controls that can be used to
ensure the secure and accurate processing of data within the system.