Essay Help Services

What are the risks associated with Information security system?

Home What are the risks associated with Information security system?

What are the risks associated with Information security system?

  • 04/02/2019

Votes Up


Vote Down



Risks in the information security is occurred from any ways in an organization. Information security risks in an organization may lead to major security challenges that can reduce the overall progress of an organization. It is very important that these risks can be mitigated and managed so that overall confidential data cannot be harmed much. Some of the information security risks that an organization can faced are as outlined below:



  • Cyberattacks.
  • Security breach.
  • Unauthorized access
  • MITM attack.
  • Sniffing attack.
  • Social engineering.
  • Denial of services attack.


These information security risks can be very infectious for the organization as well as other sectors. These sectors can lose all controls while imposing these risks or issues in the organization. Following information security risks are explained below:


Cyberattacks- It is one of the major risks that an information security system can face. Due to the presence of these attacks, overall security of private and confidential data can be reduced and this may lead to reduction in the overall organizational processes.  


Security breach-  Breach in security is one of the major risks in information security. Data breach may affect the overall organization adversely. Lack of security and encryption is also considered as risks in information security.


Man in the middle attack-  It is sort of security attack that aims to destroy all the security access of the users in an adverse manner. This attack imposed between conversation of two individuals (a sender and a recipient). In this conversation is covered by attacker which acts as middle man and recipient gets modified information in the form of conversation.


Unauthorized access- This is also considered as major risks in information security. Access of all confidential data is enabled by hackers so that overall security principle is breached.


Denial of services (DOS): These attacks can be performed in number of ways such as consuming full bandwidth of server, degrading configuration of devices or disrupting physical devices of network. these types of attacks are aimed to degrade the performance of system and allow the authorized users to use the system. This attacker sends number of requests to the server which makes server busy and the authorized user cannot get access to system information.


Sniffing attack: These types of attacks come under category of passive attacks and in this attack the attacker does not modifies the information, but sensitive information channel. Examples of sniffing attacks are traffic analysis in which attackers find the traffic flow in the network channel and finds the vulnerability of a computer network.



  • 0
  • 0

Risks or threats can occur in many ways within the information security like software attacks, identity theft, theft of intellectual properly, theft information or equipment, information extortion and sabotage.

Threat: the threat can be anything that can intentionally or accidentally harm the entire system, information and data of an organization. the threat can take advantage of a vulnerability to breach the security and negatively harm, erase and alter the objects or objects of interest.

Software attacks: The attacks by Trojan Horses, Worms, and viruses etc. There are several users who believes that the bots, worms, virus and malware are all the equal things. But eventually, they are not the same things. The one and only similarity of these attacks are they all are malicious software which behaves differently.

Malware: The malware is a combination of two above terms such as software and malware. Thus, the malware typically means malicious software, which can be an intrusive program code or anything that designed to process malicious operation within a system. Further, the malware can be divided in two categories such as malware actions and infections methods. The malware based on the infections methods are can be the worms, virus, Trojan, and bots. On the other hand, the malware based on the basis of actions are Adware, Spyware, Ransomware, Scareware, Rootkits and Zombies.

  • 0
  • 0

Risks in information security are related to confidentiality, integrity, and availability of the information. Vulnerabilities, threats, and cyber-attacks needs to be identified to assess risk in information security. Information assets are also identified as are more vulnerable to cyber-attacks and risks to attacked by intruders more often. Following are the terms explained to analyses the risk in information security in terms of attacks.

Attack surface:  It is defined as a weakness of a system which allows an attacker to decrease system’s   information assurance. It mainly attacks to the system flaws so that system can weak and one can easily access information by just merely attack on vulnerable system. It is risk to violate CIA trade.

Backdoors: It is a method of evading normal authentication, obtaining plain text or information while unknowing of others. It is kind of unauthorized access of data. It can be easily evaded by intruders if higher level security measures are not implemented. Information integrity and confidentiality can be void in this type risk. For this, one should need to encrypt data and then send it on network so that no one can understand encrypted message and information security helps to secure and encrypt data.

Direct access attacks: Is associated with the availability of the information. in this, if unapproved user gains physical access to a computer then it may be disaster as person can change many functions, install malicious software, worms, virus, including operating system modification which may cause damage to system and are the only type of attack which need not internet to access system. One can defeat this attack by encryption method of data.

Denial of service attacks: Unlike from other attacks to gain access of system, it is used only to degrade system performance by deliberately entering wrong passwords many times to cause the target account to be locked, or overload the system performance to block all users at once. It is also used to allow malicious worm and virus to enter the system and running program continuously at background of computer system which reduce system power. It is very hard to secure system from denial service attack but it can be prevented by implementing high level security measures.

Spoofing: It describes as a situation in which one person or program tricks as another user identity by providing wrong data and thus gained an illegitimate access.

Tampering: Means to change data which may cause to transmitted wrong information by receiver and is harmful for user business.

  • 0
  • 0

Interruption- In this attack, intruder can block the information entirely so that data become unavailable to the legitimate user.

·       Modification- Intruder can modify the original data by shuffling, changing and inserting information in original message through which the message will lose its actual meaning.

·       Fabrication- In this threat, additional data is inserted in the message which involves adding a password to a system, replaying previously send messages etc.

·       Phishing attacks- These attacks are most probably carried out to steal confidential information of the users such as user password. These attacks are so particular and targeted and the success rate of this attack are higher.

·       Data theft- In this, the attacker can easily use the information to identify which security software is used by the user and try to break the security of the software and come across the confidential information of the company.

·       Man-in-middle attack- Attackers most probably prefer the path which is less resistance. Third party providers should be included in the systems, in this case, client data would be compromised through third-party remote access tools. In most of the cases, the third party service provider had unwanted access to all client system.

·       Interception- Intruder can access the information of the legitimate user by performing data interception attack. Intruder can access the information by-directly observe the information and can use that information for illegal purpose. Intruder can intercept the data that undergoes transmission. Another attacks that are used to achieve this purpose are illicit data copying, eavesdropping, masquerading and tampering.

  • 0
  • 0

  • 0
  • 0

Add your Answer

Search Here

Latest Reviews

Payments And Security