Information systems use data in the form of computer files that are accessed by large number of people and by groups outside the organization. Consequently, computerized data are more susceptible to destruction, fraud, error, and misuse.When computer systems fail to run or work as required, firms that depend heavily on computers face a serious loss of business function. For example, firms which need Web sites continuously available online for electronic commerce stand to lose millions of dollars for every business day that the sites are not working and firms relaying on computers to process their critical business transactions might face a total loss of business function if they lose computer capability for more than a few days.
Why Systems are Vulnerable??
When large amounts of data are stored in electronic form they are vulnerable to many threats like hardware failure, software failure, personnel activities, terminal access penetration, theft of data, services, and equipment, fire, electrical problems, user errors, program changes, and telecommunication problems.
Advances in telecommunications networks and computer software have magnified the vulnerability. Through telecommunications networks, information systems in different locations can be interconnected and the possibility for unauthorized access, abuse, or fraud is not limited to a single location but can occur at any access point in the network.
Additionally, more complex and diverse hardware, software, organizational, and personnel arrangements are required for telecommunication networks, creating new areas and opportunities for penetration and manipulation. Wireless networks using radio-based technology are even more vulnerable to penetration because radio frequency bands are easy to scan. LANs that use Wi-Fi standard can be easily penetrated by hackers armed with laptops, wireless cards, external antennae, and freeware hacking software.
Hackers and Computer Viruses: A hacker (or intruder) is a person who uses the latest technology and their skills to gain unauthorized access to a computer network for profit, criminal mischief, or personnel pleasure. There are many ways that hacker break-ins can harm businesses. For example, in denial of service attack, hackers flood a network server or Web server with many thousands of false communications or requests for services in order to crash the network.
Hackers propagating computer viruses have caused serious disruptions too. Computer viruses are rogue software programs that are difficult to detect, which spread rapidly through computer systems, destroying data or disrupting processing and memory systems. Many viruses today are spread through the Internet and diskettes from outside source or infected machines.
Organizations can use antivirus software and screening procedures to reduce the chances of infection. Antivirus software is software designed to detect and often eliminate, computer viruses from infected area.